Samba Cifs-Utils vulnerabilities
9 known vulnerabilities affecting samba/cifs-utils.
Total CVEs
9
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM4LOW3
Vulnerabilities
Page 1 of 1
CVE-2025-2312MEDIUMCVSS 5.9≥ 0, < 2:7.2-12025-03-25
CVE-2025-2312 [MEDIUM] CVE-2025-2312: A flaw was found in cifs-utils
A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache.
osv
CVE-2022-29869MEDIUMCVSS 5.3fixed in 6.152022-04-28
CVE-2022-29869 [MEDIUM] CWE-532 CVE-2022-29869: cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains =
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
nvdosv
CVE-2022-27239HIGHCVSS 7.8fixed in 6.152022-04-27
CVE-2022-27239 [HIGH] CWE-787 CVE-2022-27239: In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-li
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
nvdosv
CVE-2021-20208MEDIUMCVSS 6.1≥ 4.0, < 6.13vcifs-utils 6.132021-04-19
CVE-2021-20208 [MEDIUM] CWE-266 CVE-2021-20208: A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
cvelistv5nvdosv
CVE-2020-14342HIGHCVSS 7.0≥ 5.6, ≤ 6.10v6.112020-09-09
CVE-2020-14342 [HIGH] CWE-77 CVE-2020-14342: It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, wh
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
cvelistv5nvdosv
CVE-2011-3585MEDIUMCVSS 4.7≥ 0, < 2:4.5-12019-12-31
CVE-2011-3585 [MEDIUM] CVE-2011-3585: Multiple race conditions in the (1) mount
Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists.
osv
CVE-2012-1586LOWCVSS 2.1PoC≥ 0, < 2:5.3-22012-08-27
CVE-2012-1586 [LOW] CVE-2012-1586: mount
mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
osv
CVE-2011-2724LOWCVSS 2.1≥ 0, < 2:5.1-12011-09-06
CVE-2011-2724 [LOW] CVE-2011-2724: The check_mtab function in client/mount
The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
osv
CVE-2011-1678LOWCVSS 3.3≥ 0, < 2:5.1-12011-04-10
CVE-2011-1678 [LOW] CVE-2011-1678: smbfs in Samba 3
smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
osv