Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0332

Опубликовано: 28 фев. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-0332: samba security update (CRITICAL)

[3.0.33-3.38.el5]

  • Security release, fixes CVE-2012-0870
  • resolves: #795718

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libsmbclient

3.0.33-3.38.el5_8

libsmbclient-devel

3.0.33-3.38.el5_8

samba

3.0.33-3.38.el5_8

samba-client

3.0.33-3.38.el5_8

samba-common

3.0.33-3.38.el5_8

samba-swat

3.0.33-3.38.el5_8

Oracle Linux x86_64

libsmbclient

3.0.33-3.38.el5_8

libsmbclient-devel

3.0.33-3.38.el5_8

samba

3.0.33-3.38.el5_8

samba-client

3.0.33-3.38.el5_8

samba-common

3.0.33-3.38.el5_8

samba-swat

3.0.33-3.38.el5_8

Oracle Linux i386

libsmbclient

3.0.33-3.38.el5_8

libsmbclient-devel

3.0.33-3.38.el5_8

samba

3.0.33-3.38.el5_8

samba-client

3.0.33-3.38.el5_8

samba-common

3.0.33-3.38.el5_8

samba-swat

3.0.33-3.38.el5_8

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.

redhat
больше 13 лет назад

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.

nvd
больше 13 лет назад

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.

debian
больше 13 лет назад

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used ...

github
больше 3 лет назад

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.