Samba Samba is the standard Windows interoperability suite of programs for Linux and Unix.
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Samba product.
RSS Feeds for Samba security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Samba products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Samba Sorted by Most Security Vulnerabilities since 2018
Known Exploited Samba Vulnerabilities
The following Samba vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Samba Remote Code Execution Vulnerability |
Samba contains a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share and then cause the server to load and execute it. CVE-2017-7494 Exploit Probability: 94.2% |
March 30, 2023 |
The vulnerability CVE-2017-7494: Samba Remote Code Execution Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.
By the Year
In 2025 there have been 8 vulnerabilities in Samba with an average score of 7.0 out of ten. Last year, in 2024 Samba had 1 security vulnerability published. That is, 7 more vulnerabilities have already been reported in 2025 as compared to last year. Last year, the average CVE base score was greater by 0.55
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 8 | 6.95 |
| 2024 | 1 | 7.50 |
| 2023 | 20 | 6.47 |
| 2022 | 30 | 7.30 |
| 2021 | 6 | 6.97 |
| 2020 | 15 | 6.31 |
| 2019 | 14 | 6.26 |
| 2018 | 19 | 6.84 |
It may take a day or so for new Samba vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Samba Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-10230 | Nov 07, 2025 |
Samba WINS Hook RCE via Unvalidated NetBIOS NamesA flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controllers wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process. |
|
| CVE-2025-9640 | Oct 15, 2025 |
Samba vfs_streams_xattr Heap LE Leading to ID DisclosureA flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability. |
|
| CVE-2025-0620 | Jun 06, 2025 |
Samba smbd Group Membership Flaw Exposes SharesA flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again. |
|
| CVE-2024-12084 | Jan 15, 2025 |
rsync Daemon Heap Bof via Checksum Length OverrunA heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer. |
|
| CVE-2024-12088 | Jan 14, 2025 |
Rsync --safe-links Path Traversal, Arbitrary File WriteA flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory. |
|
| CVE-2024-12087 | Jan 14, 2025 |
Path traversal in rsync via --inc-recursive optionA path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client. |
|
| CVE-2024-12086 | Jan 14, 2025 |
Rsync Server Remote File Enumeration via Checksum ExploitA flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client. |
|
| CVE-2024-12085 | Jan 14, 2025 |
Rsync: Checksum Length Manipulation Enables Stack Data LeakA flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time. |
|
| CVE-2020-25720 | Nov 17, 2024 |
Samba Active Directory Object Creation Privilege Escalation VulnerabilityA vulnerability was found in Samba where a delegated administrator with permission to create objects in Active Directory can write to all attributes of the newly created object, including security-sensitive attributes, even after the object's creation. This issue occurs because the administrator owns the object due to the lack of an Access Control List (ACL) at the time of creation and later being recognized as the 'creator owner.' The retained significant rights of the delegated administrator may not be well understood, potentially leading to unintended privilege escalation or security risks. |
|
| CVE-2023-46768 | Nov 08, 2023 |
Samba idmap Multi-threading Race Causing Feature AbuseMulti-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally. |
|
| CVE-2023-4154 | Nov 07, 2023 |
Samba DirSync Control Exposes AD Secrets to RODC and Privileged UsersA design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence. |
|
| CVE-2023-42669 | Nov 06, 2023 |
Samba rpcecho RPC DoS via dcesrv_echo_TestSleep()A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task. |
|
| CVE-2023-3961 | Nov 03, 2023 |
Samba Pipe Name Path Traversal Potential Priv EscalationA path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes. |
|
| CVE-2023-4091 | Nov 03, 2023 |
Samba SMB Truncation via acl_xattr despite Read-OnlyA vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions. |
|
| CVE-2023-42670 | Nov 03, 2023 |
Samba RPC Listener Abuse Enables AD DC DisruptionA flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services. |
|
| CVE-2023-5568 | Oct 25, 2023 |
Samba Auth Heap Overflow DoSA heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service. |
|
| CVE-2022-2127 | Jul 20, 2023 |
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.cAn out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash. |
|
| CVE-2023-34966 | Jul 20, 2023 |
An infinite loop vulnerability was found in Samba's mdssvc RPC service for SpotlightAn infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. |
|
| CVE-2023-3347 | Jul 20, 2023 |
A vulnerability was found in Samba's SMB2 packet signing mechanismA vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data. |
|
| CVE-2023-34968 | Jul 20, 2023 |
A path disclosure vulnerability was found in SambaA path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path. |
|
| CVE-2023-34967 | Jul 20, 2023 |
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for SpotlightA Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves. |
|
| CVE-2023-0922 | Apr 03, 2023 |
The Samba AD DC administration toolThe Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. |
|
| CVE-2023-0225 | Apr 03, 2023 |
A flaw was found in SambaA flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. |
|
| CVE-2023-0614 | Apr 03, 2023 |
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keysThe fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. |
|
| CVE-2021-20251 | Mar 06, 2023 |
A flaw was found in sambaA flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met. |
|
| CVE-2022-45141 | Mar 06, 2023 |
Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumedSince the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96). |
|
| CVE-2018-14628 | Jan 17, 2023 |
An information leak vulnerability was discovered in Samba's LDAP serverAn information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store. |
|
| CVE-2022-3592 | Jan 12, 2023 |
A symlink following vulnerability was found in Samba, where a user can create a symbolic linkA symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make 'smbd' escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the 'smbd' configured share path and gain access to another restricted server's filesystem. |
|
| CVE-2022-3437 | Jan 12, 2023 |
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of HeimdalA heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack. |
|
| CVE-2022-42898 | Dec 25, 2022 |
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow)PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug." |
|
| CVE-2022-44640 | Dec 25, 2022 |
Heimdal before 7.7.1Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). |
|
| CVE-2022-4603 | Dec 18, 2022 |
A vulnerability classified as problematic has been found in pppA vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario. |
|
| CVE-2022-37966 | Nov 09, 2022 |
Windows Kerberos RC4-HMAC Elevation of Privilege VulnerabilityWindows Kerberos RC4-HMAC Elevation of Privilege Vulnerability |
|
| CVE-2022-37967 | Nov 09, 2022 |
Windows Kerberos Elevation of Privilege VulnerabilityWindows Kerberos Elevation of Privilege Vulnerability |
|
| CVE-2022-38023 | Nov 09, 2022 |
Netlogon RPC Elevation of Privilege VulnerabilityNetlogon RPC Elevation of Privilege Vulnerability |
|
| CVE-2022-1615 | Sep 01, 2022 |
In Samba, GnuTLS gnutls_rnd()In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values. |
|
| CVE-2022-32743 | Sep 01, 2022 |
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attributeSamba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it. |
|
| CVE-2022-0336 | Aug 29, 2022 |
The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensureThe Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity. |
|
| CVE-2022-2031 | Aug 25, 2022 |
A flaw was found in SambaA flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services. |
|
| CVE-2022-32742 | Aug 25, 2022 |
A flaw was found in SambaA flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer). |
|
| CVE-2022-32744 | Aug 25, 2022 |
A flaw was found in SambaA flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. |
|
| CVE-2022-32746 | Aug 25, 2022 |
A flaw was found in the Samba AD LDAP serverA flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl. |
|
| CVE-2022-32745 | Aug 25, 2022 |
A flaw was found in SambaA flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. |
|
| CVE-2021-20316 | Aug 23, 2022 |
A flaw was found in the way Samba handled file/directory metadataA flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share. |
|
| CVE-2021-3670 | Aug 23, 2022 |
MaxQueryDuration not honoured in Samba AD DC LDAPMaxQueryDuration not honoured in Samba AD DC LDAP |
|
| CVE-2022-29154 | Aug 02, 2022 |
An issue was discovered in rsync before 3.2.5An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file). |
|
| CVE-2022-29869 | Apr 28, 2022 |
cifs-utils through 6.14, with verbose loggingcifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. |
|
| CVE-2022-27239 | Apr 27, 2022 |
In cifs-utils through 6.14In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. |
|
| CVE-2020-25721 | Mar 16, 2022 |
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid)Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets. |
|
| CVE-2021-23192 | Mar 02, 2022 |
A flaw was found in the way samba implemented DCE/RPCA flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. |
|