Samba Buffer Overflow

HIGH (10.0) No Patch (10304 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 3.02% chance of exploitation (percentile: 86%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

Samba is a popular open-source implementation of the SMB/CIFS protocol for Unix-like systems. This vulnerability allows a remote attacker to obtain root access by specifying a long password.

Am I affected?

You're affected if you use Samba versions 3.0.2a through 4.1.12. Check with: smbclient -Q // (for Windows clients) or testparm -s // (for Linux/Unix clients). Note that this is a remote vulnerability, and no authentication is required.

Affected Products

Samba Team / Samba

How to fix

Upgrade to Samba 4.2.0 or later.
- For immediate mitigation: Restrict password length using the map password = yes option in your smb.conf file.