Added |
CPE Configuration |
|
OR
*cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
Changed |
CPE Configuration |
Record truncated, showing 500 of 6101 characters.
View Entire Change Record
OR
*cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
*cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
*cpe:2.3:
|
OR
*cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (excluding) 3.3.16
*cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 3.4.0 up to (excluding) 3.4.14
*cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 3.5.0 up to (excluding) 3.5.10
|
Removed |
Evaluator Description |
Per: http://www.samba.org/samba/security/CVE-2011-2694
'Note that SWAT must be enabled in order for this vulnerability to be exploitable. By default, SWAT is *not* enabled on a Samba install.'
|
|
Changed |
Reference Type |
http://jvn.jp/en/jp/JVN63041502/index.html No Types Assigned
|
http://jvn.jp/en/jp/JVN63041502/index.html Third Party Advisory
|
Changed |
Reference Type |
http://osvdb.org/74072 No Types Assigned
|
http://osvdb.org/74072 Broken Link
|
Changed |
Reference Type |
http://samba.org/samba/history/samba-3.5.10.html No Types Assigned
|
http://samba.org/samba/history/samba-3.5.10.html Vendor Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/45393 Vendor Advisory
|
http://secunia.com/advisories/45393 Not Applicable, Vendor Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/45488 No Types Assigned
|
http://secunia.com/advisories/45488 Not Applicable, Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/45496 No Types Assigned
|
http://secunia.com/advisories/45496 Not Applicable, Third Party Advisory
|
Changed |
Reference Type |
http://securitytracker.com/id?1025852 No Types Assigned
|
http://securitytracker.com/id?1025852 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://ubuntu.com/usn/usn-1182-1 No Types Assigned
|
http://ubuntu.com/usn/usn-1182-1 Third Party Advisory
|
Changed |
Reference Type |
http://www.debian.org/security/2011/dsa-2290 No Types Assigned
|
http://www.debian.org/security/2011/dsa-2290 Third Party Advisory
|
Changed |
Reference Type |
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 No Types Assigned
|
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link, Third Party Advisory
|
Changed |
Reference Type |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 No Types Assigned
|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 Broken Link
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/48901 No Types Assigned
|
http://www.securityfocus.com/bid/48901 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://bugzilla.redhat.com/show_bug.cgi?id=722537 Patch
|
https://bugzilla.redhat.com/show_bug.cgi?id=722537 Issue Tracking, Patch
|
Changed |
Reference Type |
https://bugzilla.samba.org/show_bug.cgi?id=8289 Patch
|
https://bugzilla.samba.org/show_bug.cgi?id=8289 Issue Tracking, Patch
|
Changed |
Reference Type |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 No Types Assigned
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 Third Party Advisory, VDB Entry
|