Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-23gc-7p36-fm6g

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

EPSS

Процентиль: 92%
0.07869
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

redhat
почти 21 год назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

nvd
больше 20 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

debian
больше 20 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 a ...

EPSS

Процентиль: 92%
0.07869
Низкий