Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19344

Опубликовано: 21 янв. 2020
Источник: debian
EPSS Низкий

Описание

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.11.5+dfsg-1package
sambanot-affectedstretchpackage
sambanot-affectedjessiepackage

Примечания

  • https://www.samba.org/samba/security/CVE-2019-19344.html

EPSS

Процентиль: 84%
0.02308
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

CVSS3: 6.5
redhat
около 6 лет назад

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

CVSS3: 6.5
nvd
около 6 лет назад

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

CVSS3: 6.5
github
больше 3 лет назад

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

CVSS3: 6.5
fstec
около 6 лет назад

Уязвимость вызова realloc() пакета программ сетевого взаимодействия Samba, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 84%
0.02308
Низкий