Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0465

Опубликовано: 10 апр. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-0465: samba security update (CRITICAL)

[3.5.10-115]

  • Security Release, fixes CVE-2012-1182
  • resolves: #804644

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libsmbclient

3.0.33-3.39.el5_8

libsmbclient-devel

3.0.33-3.39.el5_8

samba

3.0.33-3.39.el5_8

samba-client

3.0.33-3.39.el5_8

samba-common

3.0.33-3.39.el5_8

samba-swat

3.0.33-3.39.el5_8

Oracle Linux x86_64

libsmbclient

3.0.33-3.39.el5_8

libsmbclient-devel

3.0.33-3.39.el5_8

samba

3.0.33-3.39.el5_8

samba-client

3.0.33-3.39.el5_8

samba-common

3.0.33-3.39.el5_8

samba-swat

3.0.33-3.39.el5_8

Oracle Linux i386

libsmbclient

3.0.33-3.39.el5_8

libsmbclient-devel

3.0.33-3.39.el5_8

samba

3.0.33-3.39.el5_8

samba-client

3.0.33-3.39.el5_8

samba-common

3.0.33-3.39.el5_8

samba-swat

3.0.33-3.39.el5_8

Oracle Linux 6

Oracle Linux x86_64

libsmbclient

3.5.10-115.el6_2

libsmbclient-devel

3.5.10-115.el6_2

samba

3.5.10-115.el6_2

samba-client

3.5.10-115.el6_2

samba-common

3.5.10-115.el6_2

samba-doc

3.5.10-115.el6_2

samba-domainjoin-gui

3.5.10-115.el6_2

samba-swat

3.5.10-115.el6_2

samba-winbind

3.5.10-115.el6_2

samba-winbind-clients

3.5.10-115.el6_2

samba-winbind-devel

3.5.10-115.el6_2

samba-winbind-krb5-locator

3.5.10-115.el6_2

Oracle Linux i686

libsmbclient

3.5.10-115.el6_2

libsmbclient-devel

3.5.10-115.el6_2

samba

3.5.10-115.el6_2

samba-client

3.5.10-115.el6_2

samba-common

3.5.10-115.el6_2

samba-doc

3.5.10-115.el6_2

samba-domainjoin-gui

3.5.10-115.el6_2

samba-swat

3.5.10-115.el6_2

samba-winbind

3.5.10-115.el6_2

samba-winbind-clients

3.5.10-115.el6_2

samba-winbind-devel

3.5.10-115.el6_2

samba-winbind-krb5-locator

3.5.10-115.el6_2

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

github
больше 3 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.