{"id":"CVE-2015-5299","details":"The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.","modified":"2026-01-27T04:13:58.237864Z","published":"2015-12-29T22:59:03Z","withdrawn":"2026-01-27T04:13:58.237864Z","related":["MGASA-2016-0094","SUSE-SU-2015:2304-1","SUSE-SU-2015:2305-1","SUSE-SU-2016:0032-1","SUSE-SU-2016:0164-1","openSUSE-SU-2024:10069-1"],"references":[{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3433"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/79729"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034493"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2855-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2855-2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1276126"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-47"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2015-5299.html"},{"type":"WEB","url":"https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}