Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0488

Опубликовано: 16 июн. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0488: samba and samba3x security update (CRITICAL)

samba:

[3.0.33-3.29.el5]

  • Security Release, fixes CVE-2010-2063
  • resolves: #602320

samba3x:

[3.3.8-0.52]

  • Security Release, fixes CVE-2010-2063
  • resolves: #602322

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libsmbclient

3.0.33-3.29.el5_5

libsmbclient-devel

3.0.33-3.29.el5_5

libtalloc

1.2.0-52.el5_5

libtalloc-devel

1.2.0-52.el5_5

libtdb

1.1.2-52.el5_5

libtdb-devel

1.1.2-52.el5_5

samba

3.0.33-3.29.el5_5

samba-client

3.0.33-3.29.el5_5

samba-common

3.0.33-3.29.el5_5

samba-swat

3.0.33-3.29.el5_5

samba3x

3.3.8-0.52.el5_5

samba3x-client

3.3.8-0.52.el5_5

samba3x-common

3.3.8-0.52.el5_5

samba3x-doc

3.3.8-0.52.el5_5

samba3x-domainjoin-gui

3.3.8-0.52.el5_5

samba3x-swat

3.3.8-0.52.el5_5

samba3x-winbind

3.3.8-0.52.el5_5

samba3x-winbind-devel

3.3.8-0.52.el5_5

tdb-tools

1.1.2-52.el5_5

Oracle Linux x86_64

libsmbclient

3.0.33-3.29.el5_5

libsmbclient-devel

3.0.33-3.29.el5_5

libtalloc

1.2.0-52.el5_5

libtalloc-devel

1.2.0-52.el5_5

libtdb

1.1.2-52.el5_5

libtdb-devel

1.1.2-52.el5_5

samba

3.0.33-3.29.el5_5

samba-client

3.0.33-3.29.el5_5

samba-common

3.0.33-3.29.el5_5

samba-swat

3.0.33-3.29.el5_5

samba3x

3.3.8-0.52.el5_5

samba3x-client

3.3.8-0.52.el5_5

samba3x-common

3.3.8-0.52.el5_5

samba3x-doc

3.3.8-0.52.el5_5

samba3x-domainjoin-gui

3.3.8-0.52.el5_5

samba3x-swat

3.3.8-0.52.el5_5

samba3x-winbind

3.3.8-0.52.el5_5

samba3x-winbind-devel

3.3.8-0.52.el5_5

tdb-tools

1.1.2-52.el5_5

Oracle Linux i386

libsmbclient

3.0.33-3.29.el5_5

libsmbclient-devel

3.0.33-3.29.el5_5

libtalloc

1.2.0-52.el5_5

libtalloc-devel

1.2.0-52.el5_5

libtdb

1.1.2-52.el5_5

libtdb-devel

1.1.2-52.el5_5

samba

3.0.33-3.29.el5_5

samba-client

3.0.33-3.29.el5_5

samba-common

3.0.33-3.29.el5_5

samba-swat

3.0.33-3.29.el5_5

samba3x

3.3.8-0.52.el5_5

samba3x-client

3.3.8-0.52.el5_5

samba3x-common

3.3.8-0.52.el5_5

samba3x-doc

3.3.8-0.52.el5_5

samba3x-domainjoin-gui

3.3.8-0.52.el5_5

samba3x-swat

3.3.8-0.52.el5_5

samba3x-winbind

3.3.8-0.52.el5_5

samba3x-winbind-devel

3.3.8-0.52.el5_5

tdb-tools

1.1.2-52.el5_5

Связанные CVE

Связанные уязвимости

ubuntu
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

redhat
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

nvd
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

debian
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chai ...

github
около 3 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.