![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0201 – Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow
https://notcve.org/view.php?id=CVE-2003-0201
15 Apr 2003 — Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función call_trans2open en trans2.c de Samba 2.2.x anteriores a 2.2.8a, 2.0.10 y versiones anteriores 2.0.x, y Samba-TNG anteriores a de 0.3.2, permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/16880 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0085 – Samba 2.2.x - 'nttrans' Remote Overflow
https://notcve.org/view.php?id=CVE-2003-0085
18 Mar 2003 — Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/9936 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0086
https://notcve.org/view.php?id=CVE-2003-0086
18 Mar 2003 — The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. • ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-2196
https://notcve.org/view.php?id=CVE-2002-2196
31 Dec 2002 — Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-1162 – Samba 2.0.x/2.2 - Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2001-1162
23 Jun 2001 — Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. • https://www.exploit-db.com/exploits/20968 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0406 – Samba 2.0.x - Insecure TMP File Symbolic Link
https://notcve.org/view.php?id=CVE-2001-0406
24 May 2001 — Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient. • https://www.exploit-db.com/exploits/20776 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0936 – Samba 2.0.7 - SWAT Logfile Permissions
https://notcve.org/view.php?id=CVE-2000-0936
19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords. • https://www.exploit-db.com/exploits/20341 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0937 – Samba 2.0.7 - SWAT Logging Failure
https://notcve.org/view.php?id=CVE-2000-0937
19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks. • https://www.exploit-db.com/exploits/20340 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0938
https://notcve.org/view.php?id=CVE-2000-0938
19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0935 – Samba 2.0.7 - SWAT Symlink
https://notcve.org/view.php?id=CVE-2000-0935
19 Dec 2000 — Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows local users to overwrite arbitrary files via a symlink attack on the cgi.log file. • https://www.exploit-db.com/exploits/20339 •