Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0697

Опубликовано: 14 сент. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0697: samba security and bug fix update (CRITICAL)

[3.0.33-3.29.el5.1]

  • Security Release, fixes CVE-2010-3069
  • resolves: #632229

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libsmbclient

3.0.33-3.29.el5_5.1

libsmbclient-devel

3.0.33-3.29.el5_5.1

samba

3.0.33-3.29.el5_5.1

samba-client

3.0.33-3.29.el5_5.1

samba-common

3.0.33-3.29.el5_5.1

samba-swat

3.0.33-3.29.el5_5.1

Oracle Linux x86_64

libsmbclient

3.0.33-3.29.el5_5.1

libsmbclient-devel

3.0.33-3.29.el5_5.1

samba

3.0.33-3.29.el5_5.1

samba-client

3.0.33-3.29.el5_5.1

samba-common

3.0.33-3.29.el5_5.1

samba-swat

3.0.33-3.29.el5_5.1

Oracle Linux i386

libsmbclient

3.0.33-3.29.el5_5.1

libsmbclient-devel

3.0.33-3.29.el5_5.1

samba

3.0.33-3.29.el5_5.1

samba-client

3.0.33-3.29.el5_5.1

samba-common

3.0.33-3.29.el5_5.1

samba-swat

3.0.33-3.29.el5_5.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

redhat
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

nvd
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

debian
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...

github
около 3 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.