Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0290

Опубликовано: 02 июн. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0290: samba security and bug fix update (CRITICAL)

[3.0.28-1.el5_2.1]

  • Security fix for CVE-2008-1105
  • Fix join verification
  • Fix smb signing
  • resolves: CVE-2008-1105
  • resolves: #447380
  • resolves: #444637

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

samba

3.0.28-1.el5_2.1

samba-client

3.0.28-1.el5_2.1

samba-common

3.0.28-1.el5_2.1

samba-swat

3.0.28-1.el5_2.1

Oracle Linux i386

samba

3.0.28-1.el5_2.1

samba-client

3.0.28-1.el5_2.1

samba-common

3.0.28-1.el5_2.1

samba-swat

3.0.28-1.el5_2.1

Связанные CVE

Связанные уязвимости

ubuntu
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

redhat
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

nvd
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

debian
около 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/soc ...

github
около 3 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.