{"id":"MGASA-2013-0369","summary":"Updated samba package fixes multiple vulnerabilities","details":"Updated samba packages fix security vulnerabilities:\n\nSamba before 3.6.22 incorrectly allows login from authenticated users if the\nrequire_membership_of parameter of pam_winbind specifies only invalid group\nnames (CVE-2012-6150).\n\nIt was discovered that multiple buffer overflows in the processing of DCE-RPC\npackets may lead to the execution of arbitrary code (CVE-2013-4408).\n","modified":"2026-04-16T01:48:30.707169647Z","published":"2013-12-12T22:22:59Z","upstream":["CVE-2012-6150","CVE-2013-4408"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0369.html"},{"type":"ADVISORY","url":"http://www.samba.org/samba/security/CVE-2012-6150"},{"type":"ADVISORY","url":"http://www.samba.org/samba/security/CVE-2013-4408"},{"type":"WEB","url":"http://www.debian.org/security/2013/dsa-2812"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11871"}],"affected":[{"package":{"name":"samba","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/samba?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.15-1.3.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0369.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}