Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38xm-32fr-cm7j

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Ссылки

EPSS

Процентиль: 100%
0.9044
Критический

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

redhat
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

nvd
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

debian
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/soc ...

oracle-oval
около 17 лет назад

ELSA-2008-0290: samba security and bug fix update (CRITICAL)

EPSS

Процентиль: 100%
0.9044
Критический

Дефекты

CWE-119