U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-0178

Change History

Modified Analysis by NIST 9/01/2022 12:34:34 PM

Action Type Old Value New Value
Added CWE

								
							
							
						
NIST CWE-665
Removed CWE
NIST NVD-CWE-Other

								
						
Changed CPE Configuration
OR
     *cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 3.6.6 up to (excluding) 3.6.25
     *cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (excluding) 4.0.18
     *cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* versions from (including) 4.1.0 up to (excluding) 4.1.8
Changed Reference Type
http://advisories.mageia.org/MGASA-2014-0279.html No Types Assigned
http://advisories.mageia.org/MGASA-2014-0279.html Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html Mailing List, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59378 No Types Assigned
http://secunia.com/advisories/59378 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59407 No Types Assigned
http://secunia.com/advisories/59407 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59579 No Types Assigned
http://secunia.com/advisories/59579 Third Party Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-201502-15.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-201502-15.xml Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2014:136 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2014:136 Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2015:082 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2015:082 Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/532757/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/532757/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/67686 No Types Assigned
http://www.securityfocus.com/bid/67686 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1030308 No Types Assigned
http://www.securitytracker.com/id/1030308 Third Party Advisory, VDB Entry
Changed Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993 Third Party Advisory
Removed Evaluator Description
Per: http://cwe.mitre.org/data/definitions/665.html

"CWE-665: Improper Initialization"