Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10230

Опубликовано: 07 нояб. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.23.2+dfsg-1package
sambafixed2:4.22.6+dfsg-0+deb13u1trixiepackage
sambafixed2:4.17.12+dfsg-0+deb12u3bookwormpackage
sambaignoredbullseyepackage

Примечания

  • https://www.samba.org/samba/security/CVE-2025-10230.html

  • https://bugzilla.samba.org/show_bug.cgi?id=15903

EPSS

Процентиль: 58%
0.00373
Низкий

Связанные уязвимости

CVSS3: 10
ubuntu
2 месяца назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
nvd
2 месяца назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
github
2 месяца назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
fstec
3 месяца назад

Уязвимость реализации сервера разрешения имён WINS пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код

suse-cvrf
около 2 месяцев назад

Security update for samba

EPSS

Процентиль: 58%
0.00373
Низкий
Уязвимость CVE-2025-10230