Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0860

Опубликовано: 10 фев. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2010-0860: samba security update (CRITICAL)

[3.5.4-68.1]

  • Security Release, fixes CVE-2010-3069
  • resolves: #632264

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

libsmbclient

3.5.4-68.el6_0.1

libsmbclient-devel

3.5.4-68.el6_0.1

samba

3.5.4-68.el6_0.1

samba-client

3.5.4-68.el6_0.1

samba-common

3.5.4-68.el6_0.1

samba-doc

3.5.4-68.el6_0.1

samba-domainjoin-gui

3.5.4-68.el6_0.1

samba-swat

3.5.4-68.el6_0.1

samba-winbind

3.5.4-68.el6_0.1

samba-winbind-clients

3.5.4-68.el6_0.1

samba-winbind-devel

3.5.4-68.el6_0.1

Oracle Linux i686

libsmbclient

3.5.4-68.el6_0.1

libsmbclient-devel

3.5.4-68.el6_0.1

samba

3.5.4-68.el6_0.1

samba-client

3.5.4-68.el6_0.1

samba-common

3.5.4-68.el6_0.1

samba-doc

3.5.4-68.el6_0.1

samba-domainjoin-gui

3.5.4-68.el6_0.1

samba-swat

3.5.4-68.el6_0.1

samba-winbind

3.5.4-68.el6_0.1

samba-winbind-clients

3.5.4-68.el6_0.1

samba-winbind-devel

3.5.4-68.el6_0.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

redhat
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

nvd
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

debian
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...

github
около 3 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.