Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0698

Опубликовано: 15 сент. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0698: samba3x security update (CRITICAL)

[3.3.8-0.52.2]

  • Security Release, fixes CVE-2010-3069
  • resolves: #632231

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libtalloc

1.2.0-52.el5_5.2

libtalloc-devel

1.2.0-52.el5_5.2

libtdb

1.1.2-52.el5_5.2

libtdb-devel

1.1.2-52.el5_5.2

samba3x

3.3.8-0.52.el5_5.2

samba3x-client

3.3.8-0.52.el5_5.2

samba3x-common

3.3.8-0.52.el5_5.2

samba3x-doc

3.3.8-0.52.el5_5.2

samba3x-domainjoin-gui

3.3.8-0.52.el5_5.2

samba3x-swat

3.3.8-0.52.el5_5.2

samba3x-winbind

3.3.8-0.52.el5_5.2

samba3x-winbind-devel

3.3.8-0.52.el5_5.2

tdb-tools

1.1.2-52.el5_5.2

Oracle Linux x86_64

libtalloc

1.2.0-52.el5_5.2

libtalloc-devel

1.2.0-52.el5_5.2

libtdb

1.1.2-52.el5_5.2

libtdb-devel

1.1.2-52.el5_5.2

samba3x

3.3.8-0.52.el5_5.2

samba3x-client

3.3.8-0.52.el5_5.2

samba3x-common

3.3.8-0.52.el5_5.2

samba3x-doc

3.3.8-0.52.el5_5.2

samba3x-domainjoin-gui

3.3.8-0.52.el5_5.2

samba3x-swat

3.3.8-0.52.el5_5.2

samba3x-winbind

3.3.8-0.52.el5_5.2

samba3x-winbind-devel

3.3.8-0.52.el5_5.2

tdb-tools

1.1.2-52.el5_5.2

Oracle Linux i386

libtalloc

1.2.0-52.el5_5.2

libtalloc-devel

1.2.0-52.el5_5.2

libtdb

1.1.2-52.el5_5.2

libtdb-devel

1.1.2-52.el5_5.2

samba3x

3.3.8-0.52.el5_5.2

samba3x-client

3.3.8-0.52.el5_5.2

samba3x-common

3.3.8-0.52.el5_5.2

samba3x-doc

3.3.8-0.52.el5_5.2

samba3x-domainjoin-gui

3.3.8-0.52.el5_5.2

samba3x-swat

3.3.8-0.52.el5_5.2

samba3x-winbind

3.3.8-0.52.el5_5.2

samba3x-winbind-devel

3.3.8-0.52.el5_5.2

tdb-tools

1.1.2-52.el5_5.2

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

redhat
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

nvd
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

debian
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...

github
около 3 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.