Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-1182

Опубликовано: 10 апр. 2012
Источник: debian
EPSS Высокий

Описание

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:3.6.4-1package
samba4fixed4.0.0~alpha19+dfsg1-1package

EPSS

Процентиль: 99%
0.7681
Высокий

Связанные уязвимости

ubuntu
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

github
больше 3 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

oracle-oval
почти 13 лет назад

ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 99%
0.7681
Высокий