Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1050

Опубликовано: 13 мар. 2018
Источник: debian
EPSS Средний

Описание

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.7.4+dfsg-2package

Примечания

  • https://www.samba.org/samba/security/CVE-2018-1050.html

EPSS

Процентиль: 96%
0.2411
Средний

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 7 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVSS3: 4.3
redhat
больше 7 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVSS3: 4.3
nvd
больше 7 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVSS3: 4.3
msrc
больше 3 лет назад

Описание отсутствует

suse-cvrf
больше 7 лет назад

Security update for samba, talloc, tevent

EPSS

Процентиль: 96%
0.2411
Средний