Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9w2v-pc9r-gpj4

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Ссылки

EPSS

Процентиль: 99%
0.76396
Высокий

Связанные уязвимости

ubuntu
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

oracle-oval
больше 12 лет назад

ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 99%
0.76396
Высокий