idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
12,613
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_open_message(void) { Buffer buffer; Channel *c; char buf[1024], *cp; u_int i; buffer_init(&buffer); snprintf(buf, sizeof buf, "The following connections are open:\r\n"); buffer_append(&buffer, buf, strlen(buf)); for (i = 0; i < channels_alloc; i++) { c = channels[i]; if (c == NULL) continue; s...
237,310,304,691,336,800,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,614
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_connecting(Channel *c, fd_set *readset, fd_set *writeset) { debug3("channel %d: waiting for connection", c->self); FD_SET(c->sock, writeset); }
66,527,700,018,417,630,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,615
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_input_draining(Channel *c, fd_set *readset, fd_set *writeset) { if (buffer_len(&c->input) == 0) { packet_start(SSH_MSG_CHANNEL_CLOSE); packet_put_int(c->remote_id); packet_send(); c->type = SSH_CHANNEL_CLOSED; debug2("channel %d: closing after input drain.", c->self); } }
95,400,244,150,625,860,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,616
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_listener(Channel *c, fd_set *readset, fd_set *writeset) { FD_SET(c->sock, readset); }
281,915,963,052,709,100,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,617
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_open(Channel *c, fd_set *readset, fd_set *writeset) { u_int limit = compat20 ? c->remote_window : packet_get_maxsize(); if (c->istate == CHAN_INPUT_OPEN && limit > 0 && buffer_len(&c->input) < limit && buffer_check_alloc(&c->input, CHAN_RBUF)) FD_SET(c->rfd, readset); if (c->ostate == C...
323,020,791,920,411,180,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,618
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_open_13(Channel *c, fd_set *readset, fd_set *writeset) { if (buffer_len(&c->input) < packet_get_maxsize()) FD_SET(c->sock, readset); if (buffer_len(&c->output) > 0) FD_SET(c->sock, writeset); }
99,003,324,896,257,340,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,619
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_pre_output_draining(Channel *c, fd_set *readset, fd_set *writeset) { if (buffer_len(&c->output) == 0) chan_mark_dead(c); else FD_SET(c->sock, writeset); }
3,127,162,216,993,102,500,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,620
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_register_cleanup(int id, channel_callback_fn *fn, int do_close) { Channel *c = channel_by_id(id); if (c == NULL) { logit("channel_register_cleanup: %d: bad id", id); return; } c->detach_user = fn; c->detach_close = do_close; }
258,736,056,843,353,000,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,621
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_register_fds(Channel *c, int rfd, int wfd, int efd, int extusage, int nonblock, int is_tty) { /* Update the maximum file descriptor value. */ channel_max_fd = MAX(channel_max_fd, rfd); channel_max_fd = MAX(channel_max_fd, wfd); channel_max_fd = MAX(channel_max_fd, efd); if (rfd != -1) fcntl(rfd, F_S...
13,862,677,787,699,061,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,622
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_register_filter(int id, channel_infilter_fn *ifn, channel_outfilter_fn *ofn, channel_filter_cleanup_fn *cfn, void *ctx) { Channel *c = channel_lookup(id); if (c == NULL) { logit("channel_register_filter: %d: bad id", id); return; } c->input_filter = ifn; c->output_filter = ofn; c->filter_ctx = ct...
288,256,709,499,349,150,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,623
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_request_start(int id, char *service, int wantconfirm) { Channel *c = channel_lookup(id); if (c == NULL) { logit("channel_request_start: %d: unknown channel id", id); return; } debug2("channel %d: request %s confirm %d", id, service, wantconfirm); packet_start(SSH2_MSG_CHANNEL_REQUEST); packet_put_int...
306,834,342,012,287,670,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,624
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_send_open(int id) { Channel *c = channel_lookup(id); if (c == NULL) { logit("channel_send_open: %d: bad id", id); return; } debug2("channel %d: send open", id); packet_start(SSH2_MSG_CHANNEL_OPEN); packet_put_cstring(c->ctype); packet_put_int(c->self); packet_put_int(c->local_window); packet_put_i...
266,424,650,272,991,840,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,625
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_set_fds(int id, int rfd, int wfd, int efd, int extusage, int nonblock, int is_tty, u_int window_max) { Channel *c = channel_lookup(id); if (c == NULL || c->type != SSH_CHANNEL_LARVAL) fatal("channel_activate for non-larval channel %d.", id); channel_register_fds(c, rfd, wfd, efd, extusage, nonblock, i...
163,042,860,905,322,510,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,626
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
channel_stop_listening(void) { u_int i; Channel *c; for (i = 0; i < channels_alloc; i++) { c = channels[i]; if (c != NULL) { switch (c->type) { case SSH_CHANNEL_AUTH_SOCKET: case SSH_CHANNEL_PORT_LISTENER: case SSH_CHANNEL_RPORT_LISTENER: case SSH_CHANNEL_X11_LISTENER: case SSH_CHANNEL_UNIX_LI...
327,713,376,389,334,650,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,627
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
enter_non_blocking(void) { in_non_blocking_mode = 1; set_nonblock(fileno(stdin)); }
329,961,352,055,795,100,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,628
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
leave_non_blocking(void) { if (in_non_blocking_mode) { unset_nonblock(fileno(stdin)); in_non_blocking_mode = 0; } }
141,313,044,677,185,180,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,629
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
set_control_persist_exit_time(void) { if (muxserver_sock == -1 || !options.control_persist || options.control_persist_timeout == 0) { /* not using a ControlPersist timeout */ control_persist_exit_time = 0; } else if (channel_still_open()) { /* some client connections are still open */ if (control_persist...
62,833,982,238,575,630,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,630
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
signal_handler(int sig) { received_signal = sig; quit_pending = 1; }
56,379,792,985,041,790,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,631
mindrot
1bf477d3cdf1a864646d59820878783d42357a1d
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
None
0
window_change_handler(int sig) { received_window_change_signal = 1; signal(SIGWINCH, window_change_handler); }
194,942,740,893,137,340,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
https://nvd.nist.gov/vuln/detail/CVE-2015-5352
12,632
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
const char *charset_name(struct smb_iconv_handle *ic, charset_t ch) { switch (ch) { case CH_UTF16: return "UTF-16LE"; case CH_UNIX: return ic->unix_charset; case CH_DOS: return ic->dos_charset; case CH_UTF8: return "UTF8"; case CH_UTF16BE: return "UTF-16BE"; case CH_UTF16MUNGED: return "UTF16_MUNGED"; default: ...
233,192,837,848,886,400,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,633
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
static int close_iconv_handle(struct smb_iconv_handle *data) { unsigned c1, c2; for (c1=0;c1<NUM_CHARSETS;c1++) { for (c2=0;c2<NUM_CHARSETS;c2++) { if (data->conv_handles[c1][c2] != NULL) { if (data->conv_handles[c1][c2] != (smb_iconv_t)-1) { smb_iconv_close(data->conv_handles[c1][c2]); } data->...
187,027,597,378,025,040,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,634
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ int codepoint_cmpi(codepoint_t c1, codepoint_t c2) { if (c1 == c2 || toupper_m(c1) == toupper_m(c2)) { return 0; } return c1 - c2; }
31,699,061,154,637,393,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,635
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
smb_iconv_t get_conv_handle(struct smb_iconv_handle *ic, charset_t from, charset_t to) { const char *n1, *n2; if (ic->conv_handles[from][to]) { return ic->conv_handles[from][to]; } n1 = charset_name(ic, from); n2 = charset_name(ic, to); ic->conv_handles[from][to] = smb_iconv_open_ex(ic, n2, n1, ...
156,692,719,763,921,410,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,636
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
struct smb_iconv_handle *get_iconv_handle(void) { if (global_iconv_handle == NULL) global_iconv_handle = smb_iconv_handle_reinit(talloc_autofree_context(), "ASCII", "UTF-8", true, NULL); return global_iconv_handle; }
290,845,732,384,704,000,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,637
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
struct smb_iconv_handle *get_iconv_testing_handle(TALLOC_CTX *mem_ctx, const char *dos_charset, const char *unix_charset, bool use_builtin_handlers) { return smb_iconv_handle_reinit(mem_ctx, dos_charset, unix_charset, use_builtin_handlers, NULL); }
38,740,355,432,323,194,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,638
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ bool islower_m(codepoint_t val) { return (toupper_m(val) != val); }
296,640,697,051,309,850,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,639
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ bool isupper_m(codepoint_t val) { return (tolower_m(val) != val); }
163,716,729,019,137,170,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,640
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ codepoint_t next_codepoint_ext(const char *str, size_t len, charset_t src_charset, size_t *size) { return next_codepoint_handle_ext(get_iconv_handle(), str, len, src_charset, size); }
135,822,479,671,111,040,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,641
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ codepoint_t next_codepoint_handle(struct smb_iconv_handle *ic, const char *str, size_t *size) { /* * We assume that no multi-byte character can take more than 5 bytes * thus avoiding walking all the way down a long string. This is OK as * Unicode codepoints only go up to (U+10ffff), which can al...
303,558,994,972,892,870,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,642
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ ssize_t push_codepoint(char *str, codepoint_t c) { return push_codepoint_handle(get_iconv_handle(), str, c); }
119,023,870,062,579,820,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,643
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ ssize_t push_codepoint_handle(struct smb_iconv_handle *ic, char *str, codepoint_t c) { smb_iconv_t descriptor; uint8_t buf[4]; size_t ilen, olen; const char *inbuf; if (c < 128) { *str = c; return 1; } descriptor = get_conv_handle(ic, CH_UTF16, CH_UNIX); if (descriptor == (smb_iconv_...
288,060,792,323,293,420,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,644
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ struct smb_iconv_handle *smb_iconv_handle_reinit(TALLOC_CTX *mem_ctx, const char *dos_charset, const char *unix_charset, bool use_builtin_handlers, struct smb_iconv_handle *old_ic) { struct smb_iconv_handle *ret; if (old_ic != NULL) { ret = old_ic; close_i...
298,874,279,270,389,200,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,645
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
void smb_init_locale(void) { /* This is a useful global hook where we can ensure that the * locale is set from the environment. This is needed so that * we can use LOCALE as a codepage */ #ifdef HAVE_SETLOCALE setlocale(LC_ALL, ""); #endif }
275,665,189,933,891,130,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,646
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ codepoint_t tolower_m(codepoint_t val) { if (val < 128) { return tolower(val); } if (val >= ARRAY_SIZE(lowcase_table)) { return val; } return lowcase_table[val]; }
3,894,238,155,682,092,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,647
samba
538d305de91e34a2938f5f219f18bf0e1918763f
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
CVE-2015-5330: next_codepoint_handle_ext: don't short-circuit UTF16 low bytes UTF16 contains zero bytes when it is encoding ASCII (for example), so we can't assume the absense of the 0x80 bit means a one byte encoding. No current callers use UTF16. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by:...
0
_PUBLIC_ codepoint_t toupper_m(codepoint_t val) { if (val < 128) { return toupper(val); } if (val >= ARRAY_SIZE(upcase_table)) { return val; } return upcase_table[val]; }
84,327,013,719,736,200,000,000,000,000,000,000,000
codepoints.c
200,841,093,969,170,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,648
samba
7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
CVE-2015-5330: ldb_dn: simplify and fix ldb_dn_escape_internal() Previously we relied on NUL terminated strings and jumped back and forth between copying escaped bytes and memcpy()ing un-escaped chunks. This simple version is easier to reason about and works with unterminated strings. It may also be faster as it avoid...
0
struct ldb_dn *ldb_dn_from_ldb_val(TALLOC_CTX *mem_ctx, struct ldb_context *ldb, const struct ldb_val *strdn) { struct ldb_dn *dn; if (! ldb) return NULL; if (strdn && strdn->data && (strnlen((const char*)strdn->data, strdn->length) != strd...
212,838,933,071,052,720,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,649
samba
7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
CVE-2015-5330: ldb_dn: simplify and fix ldb_dn_escape_internal() Previously we relied on NUL terminated strings and jumped back and forth between copying escaped bytes and memcpy()ing un-escaped chunks. This simple version is easier to reason about and works with unterminated strings. It may also be faster as it avoid...
0
static void ldb_dn_mark_invalid(struct ldb_dn *dn) { dn->invalid = true; }
239,027,621,047,138,960,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,650
samba
7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
CVE-2015-5330: ldb_dn: simplify and fix ldb_dn_escape_internal() Previously we relied on NUL terminated strings and jumped back and forth between copying escaped bytes and memcpy()ing un-escaped chunks. This simple version is easier to reason about and works with unterminated strings. It may also be faster as it avoid...
0
struct ldb_dn *ldb_dn_new_fmt(TALLOC_CTX *mem_ctx, struct ldb_context *ldb, const char *new_fmt, ...) { char *strdn; va_list ap; if ( (! mem_ctx) || (! ldb)) return NULL; va_start(ap, new_fmt); strdn = talloc_vasprintf(mem_ctx, new_fmt, ap); va_end(ap); if (strdn) { struct ldb_dn *dn = ldb...
138,629,595,239,075,560,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,651
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ size_t count_chars_m(const char *s, char c) { struct smb_iconv_handle *ic = get_iconv_handle(); size_t count = 0; while (*s) { size_t size; codepoint_t c2 = next_codepoint_handle(ic, s, &size); if (c2 == c) count++; s += size; } return count; }
139,489,475,137,668,030,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,652
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
static ssize_t pull_ascii_string(char *dest, const void *src, size_t dest_len, size_t src_len, int flags) { size_t size = 0; if (flags & (STR_TERMINATE | STR_TERMINATE_ASCII)) { if (src_len == (size_t)-1) { src_len = strlen((const char *)src) + 1; } else { size_t len = strnlen((const char *)src, src_len); ...
228,461,200,795,612,230,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,653
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ ssize_t pull_string(char *dest, const void *src, size_t dest_len, size_t src_len, int flags) { if (flags & STR_ASCII) { return pull_ascii_string(dest, src, dest_len, src_len, flags); } else if (flags & STR_UNICODE) { return pull_ucs2(dest, src, dest_len, src_len, flags); } else { smb_panic("pull_strin...
300,330,129,343,827,000,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,654
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
static size_t pull_ucs2(char *dest, const void *src, size_t dest_len, size_t src_len, int flags) { size_t size = 0; if (ucs2_align(NULL, src, flags)) { src = (const void *)((const char *)src + 1); if (src_len > 0) src_len--; } if (flags & STR_TERMINATE) { if (src_len == (size_t)-1) { src_len = utf16_l...
240,090,087,980,032,050,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,655
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
static bool push_ascii_string(void *dest, const char *src, size_t dest_len, int flags, size_t *converted_size) { size_t src_len; bool ret; if (flags & STR_UPPER) { char *tmpbuf = strupper_talloc(NULL, src); if (tmpbuf == NULL) { return false; } ret = push_ascii_string(dest, tmpbuf, dest_len, flags & ~STR...
226,745,245,022,481,530,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,656
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ ssize_t push_string(void *dest, const char *src, size_t dest_len, int flags) { if (flags & STR_ASCII) { size_t size = 0; if (push_ascii_string(dest, src, dest_len, flags, &size)) { return (ssize_t)size; } else { return (ssize_t)-1; } } else if (flags & STR_UNICODE) { return push_ucs2(dest, sr...
133,391,718,816,535,670,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,657
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
static ssize_t push_ucs2(void *dest, const char *src, size_t dest_len, int flags) { size_t len=0; size_t src_len = strlen(src); size_t size = 0; bool ret; if (flags & STR_UPPER) { char *tmpbuf = strupper_talloc(NULL, src); ssize_t retval; if (tmpbuf == NULL) { return -1; } retval = push_ucs2(dest, tm...
178,918,745,739,087,430,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,658
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ void string_replace_m(char *s, char oldc, char newc) { struct smb_iconv_handle *ic = get_iconv_handle(); while (s && *s) { size_t size; codepoint_t c = next_codepoint_handle(ic, s, &size); if (c == oldc) { *s = newc; } s += size; } }
30,500,282,022,148,326,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,659
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ char *strlower_talloc(TALLOC_CTX *ctx, const char *src) { struct smb_iconv_handle *iconv_handle = get_iconv_handle(); return strlower_talloc_handle(iconv_handle, ctx, src); }
328,365,277,199,813,900,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,660
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ char *strupper_talloc(TALLOC_CTX *ctx, const char *src) { return strupper_talloc_n(ctx, src, src?strlen(src):0); }
62,298,516,514,917,350,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,661
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ char *strupper_talloc_n(TALLOC_CTX *ctx, const char *src, size_t n) { struct smb_iconv_handle *iconv_handle = get_iconv_handle(); return strupper_talloc_n_handle(iconv_handle, ctx, src, n); }
98,337,191,942,563,700,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,662
samba
a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
CVE-2015-5330: strupper_talloc_n_handle(): properly count characters When a codepoint eats more than one byte we really want to know, especially if the string is not NUL terminated. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Pair-programmed-...
0
_PUBLIC_ char *talloc_strdup_upper(TALLOC_CTX *ctx, const char *src) { return strupper_talloc(ctx, src); }
94,893,196,964,512,660,000,000,000,000,000,000,000
util_unistr.c
286,289,488,593,538,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,681
samba
f36cb71c330a52106e36028b3029d952257baf15
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=f36cb71c330a52106e36028b3029d952257baf15
CVE-2015-5330: ldb_dn_explode: copy strings by length, not terminators That is, memdup(), not strdup(). The terminators might not be there. But, we have to make sure we put the terminator on, because we tend to assume the terminator is there in other places. Use talloc_set_name_const() on the resulting chunk so tall...
0
static int ldb_dn_escape_internal(char *dst, const char *src, int len) { char c; char *d; int i; d = dst; for (i = 0; i < len; i++){ c = src[i]; switch (c) { case ' ': if (i == 0 || i == len - 1) { /* if at the beginning or end * of the string then escape */ *d++ = '\\'; *d++ = c; } e...
212,050,428,278,128,800,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,682
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_add_base(struct ldb_dn *dn, struct ldb_dn *base) { const char *s; char *t; if ( !base || base->invalid || !dn || dn->invalid) { return false; } if (dn->components) { unsigned int i; if ( ! ldb_dn_validate(base)) { return false; } s = NULL; if (dn->valid_case) { if ( ! (s = ldb_dn_...
122,460,871,743,697,500,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,683
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_add_base_fmt(struct ldb_dn *dn, const char *base_fmt, ...) { struct ldb_dn *base; char *base_str; va_list ap; bool ret; if ( !dn || dn->invalid) { return false; } va_start(ap, base_fmt); base_str = talloc_vasprintf(dn, base_fmt, ap); va_end(ap); if (base_str == NULL) { return false; } ba...
10,498,452,902,837,536,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,684
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_add_child(struct ldb_dn *dn, struct ldb_dn *child) { const char *s; char *t; if ( !child || child->invalid || !dn || dn->invalid) { return false; } if (dn->components) { unsigned int n; unsigned int i, j; if (dn->comp_num == 0) { return false; } if ( ! ldb_dn_validate(child)) { re...
19,704,549,953,290,680,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,685
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_add_child_fmt(struct ldb_dn *dn, const char *child_fmt, ...) { struct ldb_dn *child; char *child_str; va_list ap; bool ret; if ( !dn || dn->invalid) { return false; } va_start(ap, child_fmt); child_str = talloc_vasprintf(dn, child_fmt, ap); va_end(ap); if (child_str == NULL) { return false;...
201,408,732,261,747,000,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,686
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static char *ldb_dn_canonical(TALLOC_CTX *mem_ctx, struct ldb_dn *dn, int ex_format) { unsigned int i; TALLOC_CTX *tmpctx; char *cracked = NULL; const char *format = (ex_format ? "\n" : "/" ); if ( ! ldb_dn_validate(dn)) { return NULL; } tmpctx = talloc_new(mem_ctx); /* Walk backwards down the DN, grabbing...
279,077,409,659,946,570,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,687
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
char *ldb_dn_canonical_ex_string(TALLOC_CTX *mem_ctx, struct ldb_dn *dn) { return ldb_dn_canonical(mem_ctx, dn, 1); }
273,560,458,587,794,860,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,688
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static bool ldb_dn_casefold_internal(struct ldb_dn *dn) { unsigned int i; int ret; if ( ! dn || dn->invalid) return false; if (dn->valid_case) return true; if (( ! dn->components) && ( ! ldb_dn_explode(dn))) { return false; } for (i = 0; i < dn->comp_num; i++) { const struct ldb_schema_attribute *a; d...
107,780,922,011,685,170,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,689
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_check_special(struct ldb_dn *dn, const char *check) { if ( ! dn || dn->invalid) return false; return ! strcmp(dn->linearized, check); }
168,428,502,425,010,070,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,690
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
int ldb_dn_compare_base(struct ldb_dn *base, struct ldb_dn *dn) { int ret; unsigned int n_base, n_dn; if ( ! base || base->invalid) return 1; if ( ! dn || dn->invalid) return -1; if (( ! base->valid_case) || ( ! dn->valid_case)) { if (base->linearized && dn->linearized && dn->special == base->special) { /* ...
131,762,818,050,227,630,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,691
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
struct ldb_dn *ldb_dn_copy(TALLOC_CTX *mem_ctx, struct ldb_dn *dn) { struct ldb_dn *new_dn; if (!dn || dn->invalid) { return NULL; } new_dn = talloc_zero(mem_ctx, struct ldb_dn); if ( !new_dn) { return NULL; } *new_dn = *dn; if (dn->components) { unsigned int i; new_dn->components = talloc_zero_...
175,364,972,192,254,500,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,692
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static struct ldb_dn_component ldb_dn_copy_component( TALLOC_CTX *mem_ctx, struct ldb_dn_component *src) { struct ldb_dn_component dst; memset(&dst, 0, sizeof(dst)); if (src == NULL) { return dst; } dst.value = ldb_val_dup(mem_ctx, &(src->value)); if (dst.value.data == NULL) { return dst; } ...
29,163,489,995,826,033,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,693
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static bool ldb_dn_explode(struct ldb_dn *dn) { char *p, *ex_name = NULL, *ex_value = NULL, *data, *d, *dt, *t; bool trim = true; bool in_extended = true; bool in_ex_name = false; bool in_ex_value = false; bool in_attr = false; bool in_value = false; bool in_quote = false; bool is_oid = false; bool escape = f...
223,864,078,406,655,760,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,694
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static struct ldb_dn_ext_component ldb_dn_ext_copy_component( TALLOC_CTX *mem_ctx, struct ldb_dn_ext_component *src) { struct ldb_dn_ext_component dst; memset(&dst, 0, sizeof(dst)); if (src == NULL) { return dst; } dst.value = ldb_val_dup(mem_ctx, &(src->value)); if (dst.value.data == NULL) { r...
75,131,087,058,793,510,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,695
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
static int ldb_dn_extended_component_compare(const void *p1, const void *p2) { const struct ldb_dn_ext_component *ec1 = (const struct ldb_dn_ext_component *)p1; const struct ldb_dn_ext_component *ec2 = (const struct ldb_dn_ext_component *)p2; return strcmp(ec1->name, ec2->name); }
12,905,245,590,376,963,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,696
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
void ldb_dn_extended_filter(struct ldb_dn *dn, const char * const *accept_list) { unsigned int i; for (i=0; i<dn->ext_comp_num; i++) { if (!ldb_attr_in_list(accept_list, dn->ext_components[i].name)) { memmove(&dn->ext_components[i], &dn->ext_components[i+1], (dn->ext_comp_num-(i+1))*sizeof(dn->ext_compon...
231,571,898,797,411,030,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,697
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
int ldb_dn_get_comp_num(struct ldb_dn *dn) { if ( ! ldb_dn_validate(dn)) { return -1; } return dn->comp_num; }
133,846,526,528,171,840,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,698
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
const struct ldb_val *ldb_dn_get_component_val(struct ldb_dn *dn, unsigned int num) { if ( ! ldb_dn_validate(dn)) { return NULL; } if (num >= dn->comp_num) return NULL; return &dn->components[num].value; }
246,242,880,019,584,750,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,699
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
int ldb_dn_get_extended_comp_num(struct ldb_dn *dn) { if ( ! ldb_dn_validate(dn)) { return -1; } return dn->ext_comp_num; }
322,873,001,028,361,430,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,700
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
const struct ldb_val *ldb_dn_get_extended_component(struct ldb_dn *dn, const char *name) { unsigned int i; if ( ! ldb_dn_validate(dn)) { return NULL; } for (i=0; i < dn->ext_comp_num; i++) { if (ldb_attr_cmp(dn->ext_components[i].name, name) == 0) { return &dn->ext_components[i].value; } } retu...
192,297,029,846,455,650,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,701
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
char *ldb_dn_get_extended_linearized(TALLOC_CTX *mem_ctx, struct ldb_dn *dn, int mode) { const char *linearized = ldb_dn_get_linearized(dn); char *p = NULL; unsigned int i; if (!linearized) { return NULL; } if (!ldb_dn_has_extended(dn)) { return talloc_strdup(mem_ctx, linearized); } if (!ldb_dn_validate(...
323,902,131,394,816,640,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,702
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
struct ldb_context *ldb_dn_get_ldb_context(struct ldb_dn *dn) { return dn->ldb; }
40,779,579,439,032,526,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,703
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
const char *ldb_dn_get_linearized(struct ldb_dn *dn) { unsigned int i; size_t len; char *d, *n; if ( ! dn || ( dn->invalid)) return NULL; if (dn->linearized) return dn->linearized; if ( ! dn->components) { ldb_dn_mark_invalid(dn); return NULL; } if (dn->comp_num == 0) { dn->linearized = talloc_strdup(...
87,077,469,909,249,380,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,704
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
struct ldb_dn *ldb_dn_get_parent(TALLOC_CTX *mem_ctx, struct ldb_dn *dn) { struct ldb_dn *new_dn; new_dn = ldb_dn_copy(mem_ctx, dn); if ( !new_dn ) { return NULL; } if ( ! ldb_dn_remove_child_components(new_dn, 1)) { talloc_free(new_dn); return NULL; } return new_dn; }
101,481,903,420,330,890,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,705
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
const char *ldb_dn_get_rdn_name(struct ldb_dn *dn) { if ( ! ldb_dn_validate(dn)) { return NULL; } if (dn->comp_num == 0) return NULL; return dn->components[0].name; }
218,406,878,174,514,850,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,706
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
const struct ldb_val *ldb_dn_get_rdn_val(struct ldb_dn *dn) { if ( ! ldb_dn_validate(dn)) { return NULL; } if (dn->comp_num == 0) return NULL; return &dn->components[0].value; }
37,699,060,627,756,750,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,707
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_has_extended(struct ldb_dn *dn) { if ( ! dn || dn->invalid) return false; if (dn->ext_linearized && (dn->ext_linearized[0] == '<')) return true; return dn->ext_comp_num != 0; }
91,248,577,378,259,590,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,708
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_is_null(struct ldb_dn *dn) { if ( ! dn || dn->invalid) return false; if (ldb_dn_has_extended(dn)) return false; if (dn->linearized && (dn->linearized[0] == '\0')) return true; return false; }
195,645,291,388,965,980,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,709
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_is_special(struct ldb_dn *dn) { if ( ! dn || dn->invalid) return false; return dn->special; }
122,933,801,107,547,600,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,710
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_is_valid(struct ldb_dn *dn) { if ( ! dn) return false; return ! dn->invalid; }
59,249,999,860,774,240,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,711
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_remove_base_components(struct ldb_dn *dn, unsigned int num) { unsigned int i; if ( ! ldb_dn_validate(dn)) { return false; } if (dn->comp_num < num) { return false; } /* free components */ for (i = dn->comp_num - num; i < dn->comp_num; i++) { LDB_FREE(dn->components[i].name); LDB_FREE(dn->c...
164,254,648,164,907,190,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,712
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_remove_child_components(struct ldb_dn *dn, unsigned int num) { unsigned int i, j; if ( ! ldb_dn_validate(dn)) { return false; } if (dn->comp_num < num) { return false; } for (i = 0, j = num; j < dn->comp_num; i++, j++) { if (i < num) { LDB_FREE(dn->components[i].name); LDB_FREE(dn->comp...
186,093,977,131,029,860,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,713
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
void ldb_dn_remove_extended_components(struct ldb_dn *dn) { LDB_FREE(dn->ext_linearized); LDB_FREE(dn->ext_components); dn->ext_comp_num = 0; }
159,032,294,377,363,830,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,714
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
bool ldb_dn_replace_components(struct ldb_dn *dn, struct ldb_dn *new_dn) { int i; if ( ! ldb_dn_validate(dn) || ! ldb_dn_validate(new_dn)) { return false; } /* free components */ for (i = 0; i < dn->comp_num; i++) { LDB_FREE(dn->components[i].name); LDB_FREE(dn->components[i].value.data); LDB_FREE(dn->co...
102,281,994,284,462,920,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,715
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
int ldb_dn_set_component(struct ldb_dn *dn, int num, const char *name, const struct ldb_val val) { char *n; struct ldb_val v; if ( ! ldb_dn_validate(dn)) { return LDB_ERR_OTHER; } if (num >= dn->comp_num) { return LDB_ERR_OTHER; } n = talloc_strdup(dn, name); if ( ! n) { return LDB_ERR_OTHER; } ...
208,292,791,534,531,900,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,716
samba
0454b95657846fcecf0f51b6f1194faac02518bd
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0454b95657846fcecf0f51b6f1194faac02518bd
CVE-2015-5330: ldb_dn_escape_value: use known string length, not strlen() ldb_dn_escape_internal() reports the number of bytes it copied, so lets use that number, rather than using strlen() and hoping a zero got in the right place. Bug: https://bugzilla.samba.org/show_bug.cgi?id=11599 Signed-off-by: Douglas Bagnall ...
0
int ldb_dn_set_extended_component(struct ldb_dn *dn, const char *name, const struct ldb_val *val) { struct ldb_dn_ext_component *p; unsigned int i; struct ldb_val v2; if ( ! ldb_dn_validate(dn)) { return LDB_ERR_OTHER; } if (!ldb_dn_extended_syntax_by_name(dn->ldb, name)) { /* We don't know how to han...
161,159,739,097,554,780,000,000,000,000,000,000,000
ldb_dn.c
249,433,878,809,996,980,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5330
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database val...
https://nvd.nist.gov/vuln/detail/CVE-2015-5330
12,735
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
static uint16_t smb1cli_alloc_mid(struct smbXcli_conn *conn) { size_t num_pending = talloc_array_length(conn->pending); uint16_t result; if (conn->protocol == PROTOCOL_NONE) { /* * This is what windows sends on the SMB1 Negprot request * and some vendors reuse the SMB1 MID as SMB2 sequence number. */ r...
204,298,829,690,863,470,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,736
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_activate_signing(struct smbXcli_conn *conn, const DATA_BLOB user_session_key, const DATA_BLOB response) { return smb_signing_activate(conn->smb1.signing, user_session_key, response); }
201,885,260,934,296,100,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,737
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
uint32_t smb1cli_conn_capabilities(struct smbXcli_conn *conn) { return conn->smb1.capabilities; }
174,830,473,709,516,860,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,738
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_check_signing(struct smbXcli_conn *conn, const uint8_t *buf, uint32_t seqnum) { const uint8_t *hdr = buf + NBT_HDR_SIZE; size_t len = smb_len_nbt(buf); return smb_signing_check_pdu(conn->smb1.signing, hdr, len, seqnum); }
262,022,200,984,177,340,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,739
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
static NTSTATUS smb1cli_conn_dispatch_incoming(struct smbXcli_conn *conn, TALLOC_CTX *tmp_mem, uint8_t *inbuf) { struct tevent_req *req; struct smbXcli_req_state *state; NTSTATUS status; size_t num_pending; size_t i; uint8_t cmd; uint16_t mid; bool oplock_break; uint8_t *inhdr = inbuf +...
46,181,715,122,753,460,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,740
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_encryption_on(struct smbXcli_conn *conn) { return common_encryption_on(conn->smb1.trans_enc); }
5,292,687,706,818,517,300,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,741
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
uint32_t smb1cli_conn_max_xmit(struct smbXcli_conn *conn) { return conn->smb1.max_xmit; }
63,643,193,421,288,040,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,742
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_req_possible(struct smbXcli_conn *conn) { size_t pending = talloc_array_length(conn->pending); uint16_t possible = conn->smb1.server.max_mux; if (pending >= possible) { return false; } return true; }
94,629,268,927,691,500,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,743
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
const uint8_t *smb1cli_conn_server_challenge(struct smbXcli_conn *conn) { return conn->smb1.server.challenge; }
58,544,462,666,111,350,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,744
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_server_lockread(struct smbXcli_conn *conn) { return conn->smb1.server.lockread; }
304,677,867,656,514,360,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,745
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
bool smb1cli_conn_server_readbraw(struct smbXcli_conn *conn) { return conn->smb1.server.readbraw; }
211,006,793,568,394,700,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,746
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
uint16_t smb1cli_conn_server_security_mode(struct smbXcli_conn *conn) { return conn->smb1.server.security_mode; }
238,605,098,158,201,800,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,747
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
uint32_t smb1cli_conn_server_session_key(struct smbXcli_conn *conn) { return conn->smb1.server.session_key; }
240,785,564,631,895,780,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,748
samba
a819d2b440aafa3138d95ff6e8b824da885a70e9
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
CVE-2015-5296: libcli/smb: make sure we require signing when we demand encryption on a session BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
int smb1cli_conn_server_time_zone(struct smbXcli_conn *conn) { return conn->smb1.server.time_zone; }
251,158,075,899,434,370,000,000,000,000,000,000,000
smbXcli_base.c
331,622,354,437,169,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296