CVE-2016-0771

NameCVE-2016-0771
DescriptionThe internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3514-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
samba (PTS)buster, buster (security)2:4.9.5+dfsg-5+deb10u3fixed
bullseye2:4.13.13+dfsg-1~deb11u4fixed
bullseye (security)2:4.13.13+dfsg-1~deb11u5fixed
bookworm, sid2:4.16.4+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sambasourcesqueeze(not affected)
sambasourcewheezy2:3.6.6-6+deb7u7DSA-3514-1
sambasourcejessie2:4.1.17+dfsg-2+deb8u2DSA-3514-1
sambasource(unstable)2:4.3.6+dfsg-1

Notes

[wheezy] - samba <not-affected> (Vulnerable code not present)
[squeeze] - samba <not-affected> (Vulnerable code not present)
https://www.samba.org/samba/security/CVE-2016-0771.html

Search for package or bug name: Reporting problems