Описание
ELSA-2012-0332: samba security update (CRITICAL)
[3.0.33-3.38.el5]
- Security release, fixes CVE-2012-0870
- resolves: #795718
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
libsmbclient
3.0.33-3.38.el5_8
libsmbclient-devel
3.0.33-3.38.el5_8
samba
3.0.33-3.38.el5_8
samba-client
3.0.33-3.38.el5_8
samba-common
3.0.33-3.38.el5_8
samba-swat
3.0.33-3.38.el5_8
Oracle Linux x86_64
libsmbclient
3.0.33-3.38.el5_8
libsmbclient-devel
3.0.33-3.38.el5_8
samba
3.0.33-3.38.el5_8
samba-client
3.0.33-3.38.el5_8
samba-common
3.0.33-3.38.el5_8
samba-swat
3.0.33-3.38.el5_8
Oracle Linux i386
libsmbclient
3.0.33-3.38.el5_8
libsmbclient-devel
3.0.33-3.38.el5_8
samba
3.0.33-3.38.el5_8
samba-client
3.0.33-3.38.el5_8
samba-common
3.0.33-3.38.el5_8
samba-swat
3.0.33-3.38.el5_8
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used ...
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.