Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6150

Опубликовано: 03 дек. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6

Описание

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

РелизСтатусПримечание
devel

released

2:4.0.13+dfsg-1ubuntu1
esm-infra-legacy/trusty

not-affected

2:4.0.13+dfsg-1ubuntu1
esm-infra/xenial

not-affected

2:4.0.13+dfsg-1ubuntu1
lucid

released

2:3.4.7~dfsg-1ubuntu3.13
precise

released

2:3.6.3-2ubuntu2.9
precise/esm

not-affected

2:3.6.3-2ubuntu2.9
quantal

released

2:3.6.6-3ubuntu5.3
raring

released

2:3.6.9-1ubuntu1.2
saucy

released

2:3.6.18-1ubuntu3.1
trusty

released

2:4.0.13+dfsg-1ubuntu1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

DNE

trusty/esm

DNE

Показывать по

EPSS

Процентиль: 50%
0.00268
Низкий

3.6 Low

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

nvd
больше 11 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

debian
больше 11 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winb ...

github
около 3 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

CVSS3: 4.4
fstec
больше 11 лет назад

Уязвимость программного обеспечения Samba, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 50%
0.00268
Низкий

3.6 Low

CVSS2

Уязвимость CVE-2012-6150