Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cq56-hhrj-4j8p

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute.

Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute.

EPSS

Процентиль: 85%
0.02544
Низкий

Связанные уязвимости

nvd
больше 21 года назад

Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute.

debian
больше 21 года назад

Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experim ...

EPSS

Процентиль: 85%
0.02544
Низкий