DEBIAN-CVE-2025-10230

Source
https://security-tracker.debian.org/tracker/CVE-2025-10230
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-10230.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-10230
Upstream
  • CVE-2025-10230
Published
2025-11-07T20:15:35.630Z
Modified
2026-03-17T02:50:55.387987Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

References

Affected packages

Debian:11 / samba

Package

Name
samba
Purl
pkg:deb/debian/samba?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:4.*
2:4.13.5+dfsg-2
2:4.13.13+dfsg-1~deb11u1
2:4.13.13+dfsg-1~deb11u2
2:4.13.13+dfsg-1~deb11u3
2:4.13.13+dfsg-1~deb11u4
2:4.13.13+dfsg-1~deb11u5
2:4.13.13+dfsg-1~deb11u6
2:4.13.13+dfsg-1~deb11u7
2:4.13.13+dfsg-1
2:4.13.14+dfsg-1
2:4.16.0+dfsg-1
2:4.16.0+dfsg-2
2:4.16.0+dfsg-3
2:4.16.0+dfsg-4
2:4.16.0+dfsg-5
2:4.16.0+dfsg-6
2:4.16.0+dfsg-7
2:4.16.0+dfsg-7+hurd.1
2:4.16.1+dfsg-1
2:4.16.1+dfsg-2
2:4.16.1+dfsg-3~bpo11+1
2:4.16.1+dfsg-3~bpo11+2
2:4.16.1+dfsg-3~bpo11+3
2:4.16.1+dfsg-3
2:4.16.1+dfsg-4~bpo11+1
2:4.16.1+dfsg-4
2:4.16.1+dfsg-5
2:4.16.1+dfsg-6
2:4.16.1+dfsg-6+x32
2:4.16.1+dfsg-7
2:4.16.1+dfsg-8~bpo11+1
2:4.16.1+dfsg-8
2:4.16.2+dfsg-1
2:4.16.3+dfsg-1
2:4.16.4+dfsg-1
2:4.16.4+dfsg-2~bpo11+1
2:4.16.4+dfsg-2
2:4.16.4+dfsg-2+hurd.1
2:4.16.5+dfsg-1~bpo11+1
2:4.16.5+dfsg-1
2:4.16.5+dfsg-2
2:4.16.6+dfsg-1
2:4.16.6+dfsg-2
2:4.16.6+dfsg-3
2:4.16.6+dfsg-4
2:4.16.6+dfsg-5~bpo11+1
2:4.16.6+dfsg-5
2:4.16.6+dfsg-6
2:4.17.0+dfsg-1
2:4.17.0+dfsg-1+ports
2:4.17.0+dfsg-2
2:4.17.1+dfsg-1
2:4.17.2+dfsg-1
2:4.17.2+dfsg-2
2:4.17.2+dfsg-3
2:4.17.2+dfsg-4
2:4.17.2+dfsg-5
2:4.17.2+dfsg-6
2:4.17.2+dfsg-7
2:4.17.2+dfsg-8
2:4.17.2+dfsg-8+hurd.1
2:4.17.2+dfsg-9
2:4.17.3+dfsg-1~bpo11+1
2:4.17.3+dfsg-1
2:4.17.3+dfsg-2~bpo11+1
2:4.17.3+dfsg-2
2:4.17.3+dfsg-3~bpo11+1
2:4.17.3+dfsg-3
2:4.17.3+dfsg-4
2:4.17.4+dfsg-1
2:4.17.4+dfsg-2~bpo11+1
2:4.17.4+dfsg-2
2:4.17.4+dfsg-3~bpo11+1
2:4.17.4+dfsg-3
2:4.17.5+dfsg-1~bpo11+1
2:4.17.5+dfsg-1
2:4.17.5+dfsg-2
2:4.17.6+dfsg-1~bpo11+1
2:4.17.6+dfsg-1
2:4.17.7+dfsg-1~bpo11+1
2:4.17.7+dfsg-1
2:4.17.8+dfsg-1~bpo11+1
2:4.17.8+dfsg-1
2:4.17.8+dfsg-2
2:4.17.8+dfsg-2.1
2:4.18.0~rc1+dfsg-1exp
2:4.18.0~rc2+dfsg-1
2:4.18.0~rc3+dfsg-1
2:4.18.0~rc4+dfsg-1
2:4.18.0+dfsg-1~exp1
2:4.18.1+dfsg-1~exp1
2:4.18.2+dfsg-1
2:4.18.3+dfsg-1
2:4.18.3+dfsg-2
2:4.18.3+dfsg-3
2:4.18.4+dfsg-1
2:4.18.4+dfsg-2~bpo12+1
2:4.18.4+dfsg-2
2:4.18.5+dfsg-1
2:4.18.5+dfsg-2~bpo12+1
2:4.18.5+dfsg-2
2:4.18.6+dfsg-1~bpo12+1
2:4.18.6+dfsg-1
2:4.18.8+dfsg-1~bpo12+1
2:4.19.0~rc1+dfsg-1
2:4.19.0~rc1+dfsg-2
2:4.19.0~rc1+dfsg-3
2:4.19.0~rc2+dfsg-1
2:4.19.0~rc4+dfsg-1
2:4.19.0~rc4+dfsg-2
2:4.19.0+dfsg-1
2:4.19.1+dfsg-1
2:4.19.1+dfsg-2
2:4.19.1+dfsg-3
2:4.19.1+dfsg-4
2:4.19.2+dfsg-1
2:4.19.3+dfsg-1~bpo12+1
2:4.19.3+dfsg-1
2:4.19.3+dfsg-2
2:4.19.4+dfsg-1
2:4.19.4+dfsg-2~bpo12+1
2:4.19.4+dfsg-2
2:4.19.4+dfsg-3~bpo12+1
2:4.19.4+dfsg-3
2:4.19.5+dfsg-1
2:4.19.5+dfsg-2
2:4.19.5+dfsg-3
2:4.19.5+dfsg-4~bpo12+1
2:4.19.5+dfsg-4
2:4.19.5+dfsg-5
2:4.19.6+dfsg-1
2:4.19.6+dfsg-2
2:4.19.6+dfsg-3~bpo12+1
2:4.19.6+dfsg-3
2:4.20.0~rc1+dfsg-1
2:4.20.0~rc2+dfsg-1
2:4.20.0~rc2+dfsg-2
2:4.20.0~rc2+dfsg-3
2:4.20.0+dfsg-1~exp1
2:4.20.0+dfsg-1~exp2
2:4.20.1+dfsg-1
2:4.20.1+dfsg-2
2:4.20.1+dfsg-3
2:4.20.1+dfsg-4~bpo12+1
2:4.20.1+dfsg-4
2:4.20.1+dfsg-5
2:4.20.2+dfsg-1
2:4.20.2+dfsg-2~bpo12+1
2:4.20.2+dfsg-2~bpo12+2
2:4.20.2+dfsg-2
2:4.20.2+dfsg-3
2:4.20.2+dfsg-4
2:4.20.2+dfsg-5~bpo12+1
2:4.20.2+dfsg-5
2:4.20.2+dfsg-6~bpo12+1
2:4.20.2+dfsg-6
2:4.20.2+dfsg-7
2:4.20.2+dfsg-8
2:4.20.2+dfsg-9~exp1
2:4.20.2+dfsg-9~exp2
2:4.20.2+dfsg-9
2:4.20.2+dfsg-10
2:4.20.4+dfsg-1~bpo12+1
2:4.20.5+dfsg-1~bpo12+1
2:4.21.0~rc1+dfsg-1
2:4.21.0~rc1+really4.20.2+dfsg-11
2:4.21.0~rc1+really4.20.2+dfsg-11r
2:4.21.0~rc1+really4.20.3+dfsg-1
2:4.21.0~rc1+really4.20.4+dfsg-1
2:4.21.0~rc2+dfsg-1
2:4.21.0+dfsg-1
2:4.21.1+dfsg-1~bpo12+1
2:4.21.1+dfsg-1
2:4.21.1+dfsg-2~bpo12+1
2:4.21.1+dfsg-2
2:4.21.1+dfsg-2+hurd.1
2:4.21.2+dfsg-1
2:4.21.2+dfsg-2
2:4.21.2+dfsg-3~bpo12+1
2:4.21.2+dfsg-3
2:4.21.2+dfsg-4~exp1
2:4.21.2+dfsg-4
2:4.21.2+dfsg-4+hurd.1
2:4.21.3+dfsg-1~bpo12+1
2:4.21.3+dfsg-1
2:4.21.3+dfsg-2
2:4.21.3+dfsg-3
2:4.21.3+dfsg-4~bpo12+1
2:4.21.3+dfsg-4
2:4.21.3+dfsg-5~bpo12+1
2:4.21.3+dfsg-5
2:4.21.3+dfsg-6~bpo12+1
2:4.21.3+dfsg-6
2:4.21.4+dfsg-1~bpo12+1
2:4.21.4+dfsg-1
2:4.21.5+dfsg-1~bpo12+1
2:4.22.0~rc1+dfsg-1
2:4.22.0+dfsg-1
2:4.22.0+dfsg-2
2:4.22.0+dfsg-3
2:4.22.1+dfsg-1~bpo12+1
2:4.22.1+dfsg-1
2:4.22.2+dfsg-1~bpo12+1
2:4.22.2+dfsg-1
2:4.22.3+dfsg-1
2:4.22.3+dfsg-2~bpo12+1
2:4.22.3+dfsg-2
2:4.22.3+dfsg-3
2:4.22.3+dfsg-4~bpo12+1
2:4.22.3+dfsg-4
2:4.22.4+dfsg-1~deb13u1~bpo12+1
2:4.22.4+dfsg-1~deb13u1
2:4.22.4+dfsg-1
2:4.23.0~rc1+dfsg-1
2:4.23.0~rc2+dfsg-1
2:4.23.0~rc3+dfsg-1
2:4.23.0+dfsg-1
2:4.23.0+dfsg-2
2:4.23.0+dfsg-3
2:4.23.1+dfsg-1
2:4.23.2+dfsg-1
2:4.23.3+dfsg-1~bpo13+1
2:4.23.3+dfsg-1
2:4.23.4+dfsg-1~bpo13+1
2:4.23.4+dfsg-1
2:4.23.5+dfsg-1~bpo13+1
2:4.23.5+dfsg-1
2:4.23.6+dfsg-1
2:4.23.6+dfsg-2~bpo13+1
2:4.23.6+dfsg-2
2:4.24.0~rc1+dfsg-1
2:4.24.0~rc1+dfsg-2
2:4.24.0~rc1+dfsg-3
2:4.24.0~rc2+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-10230.json"

Debian:12 / samba

Package

Name
samba
Purl
pkg:deb/debian/samba?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:4.17.12+dfsg-0+deb12u3

Affected versions

2:4.*
2:4.17.8+dfsg-2
2:4.17.8+dfsg-2.1
2:4.17.9+dfsg-0+deb12u1
2:4.17.9+dfsg-0+deb12u2
2:4.17.9+dfsg-0+deb12u3~bpo11+1
2:4.17.9+dfsg-0+deb12u3
2:4.17.10+dfsg-0+deb12u1~bpo11+1
2:4.17.10+dfsg-0+deb12u1
2:4.17.11+dfsg-0+deb12u1
2:4.17.12+dfsg-0+deb12u1~bpo11+1
2:4.17.12+dfsg-0+deb12u1
2:4.17.12+dfsg-0+deb12u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-10230.json"

Debian:13 / samba

Package

Name
samba
Purl
pkg:deb/debian/samba?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:4.22.6+dfsg-0+deb13u1

Affected versions

2:4.*
2:4.22.3+dfsg-4
2:4.22.4+dfsg-1~deb13u1~bpo12+1
2:4.22.4+dfsg-1~deb13u1
2:4.22.4+dfsg-1
2:4.22.6+dfsg-0+deb13u1~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-10230.json"

Debian:14 / samba

Package

Name
samba
Purl
pkg:deb/debian/samba?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:4.23.2+dfsg-1

Affected versions

2:4.*
2:4.22.3+dfsg-4
2:4.22.4+dfsg-1~deb13u1~bpo12+1
2:4.22.4+dfsg-1~deb13u1
2:4.22.4+dfsg-1
2:4.23.0~rc1+dfsg-1
2:4.23.0~rc2+dfsg-1
2:4.23.0~rc3+dfsg-1
2:4.23.0+dfsg-1
2:4.23.0+dfsg-2
2:4.23.0+dfsg-3
2:4.23.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-10230.json"