Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2830

Опубликовано: 31 мар. 2015
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cifs-utilsunfixedpackage
cifs-utilsnot-affectedsqueezepackage
cifs-utilsnot-affectedwheezypackage

Примечания

  • cifscreds PAM not built in unstable

EPSS

Процентиль: 86%
0.02896
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

redhat
почти 12 лет назад

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

nvd
почти 11 лет назад

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

github
больше 3 лет назад

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

EPSS

Процентиль: 86%
0.02896
Низкий