Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9w2v-pc9r-gpj4

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Ссылки

EPSS

Процентиль: 99%
0.78261
Высокий

Связанные уязвимости

ubuntu
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
почти 14 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

oracle-oval
почти 13 лет назад

ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 99%
0.78261
Высокий