exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

CVE-2018-1057

Status Candidate

Overview

On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).

Related Files

Watchguard AP100/AP102/AP200 1.2.9.15 Remote Code Execution
Posted Sep 15, 2018
Authored by Stephen Shkardoon | Site metasploit.com

Watchguard AP100/AP102/AP200 version 1.2.9.15 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 7fa3f69d1966c3dc5a47252607dfd0b1ac353844235ae52605b0c964eaeec457
Gentoo Linux Security Advisory 201805-07
Posted May 23, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201805-7 - Multiple vulnerabilities have been found in Samba, the worst of which may allow remote execution of arbitrary code. Versions less than 4.5.16 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-2119, CVE-2017-14746, CVE-2017-15275, CVE-2017-7494, CVE-2018-1050, CVE-2018-1057
SHA-256 | 75d9dc5f4726c1960e8dac452254838989ffb7cf7b89fa278040830e69875411
Watchguard Hard-Coded Credentials / Failed Controls
Posted May 3, 2018
Authored by Stephen Shkardoon

WatchGuard Access Points running firmware before version 1.2.9.15 suffer from hard-coded credential, hidden authentication, file upload, and incorrect validation vulnerabilities.

tags | exploit, vulnerability, file upload
advisories | CVE-2018-10575, CVE-2018-10576, CVE-2018-10577, CVE-2018-10578
SHA-256 | 074ffab29ea1105f73419b2ca122629ebcae92a0b78ff2d60a0d32d88e59704b
Samba 4.x Password Change
Posted Mar 14, 2018
Authored by Bjorn Baumbach | Site samba.org

On a Samba 4 AD DC any authenticated user can change other users' passwords over LDAP, including the passwords of administrative users and service accounts.

tags | advisory
advisories | CVE-2018-1057
SHA-256 | 78cfd2ac47806aa2bbd492960129da59d4d087d0428c2be85a7021f0d8d2b335
Slackware Security Advisory - samba Updates
Posted Mar 14, 2018
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New samba packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security a issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2018-1057
SHA-256 | aed5629296e3d11294572e212dcbfac1a6e2c5636752a477a01c8dbbef276233
Ubuntu Security Notice USN-3595-1
Posted Mar 13, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3595-1 - Bjorn Baumbach discovered that Samba incorrectly validated permissions when changing account passwords via LDAP. An authenticated attacker could use this issue to change the password of other users, including administrators, and perform actions as those users. It was discovered that Samba incorrectly validated inputs to the RPC spoolss service. An authenticated attacker could use this issue to cause the service to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-1050, CVE-2018-1057
SHA-256 | b99956ccc224dab1426ef1277e618332855c6d72ad58ad3325799f355d6bb8f8
Debian Security Advisory 4135-1
Posted Mar 13, 2018
Authored by Debian | Site debian.org

1803-advisories/dsa-4135-1.txt 85b068ea50632a5111f3d300ea85c6bc Debian Linux Security Advisory 4135-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.

tags | advisory, vulnerability
systems | linux, unix, debian
advisories | CVE-2018-1050, CVE-2018-1057
SHA-256 | ff24ab597ff9ee51b6b72ffca51d8d02ed0ad4fed0dcbe97ca05a3298f56dbae
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close