Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0466

Опубликовано: 10 апр. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-0466: samba3x security update (CRITICAL)

[3.5.10-0.108]

  • Security Release, fixes CVE-2012-1182
  • resolves: #804650

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

samba3x

3.5.10-0.108.el5_8

samba3x-client

3.5.10-0.108.el5_8

samba3x-common

3.5.10-0.108.el5_8

samba3x-doc

3.5.10-0.108.el5_8

samba3x-domainjoin-gui

3.5.10-0.108.el5_8

samba3x-swat

3.5.10-0.108.el5_8

samba3x-winbind

3.5.10-0.108.el5_8

samba3x-winbind-devel

3.5.10-0.108.el5_8

Oracle Linux x86_64

samba3x

3.5.10-0.108.el5_8

samba3x-client

3.5.10-0.108.el5_8

samba3x-common

3.5.10-0.108.el5_8

samba3x-doc

3.5.10-0.108.el5_8

samba3x-domainjoin-gui

3.5.10-0.108.el5_8

samba3x-swat

3.5.10-0.108.el5_8

samba3x-winbind

3.5.10-0.108.el5_8

samba3x-winbind-devel

3.5.10-0.108.el5_8

Oracle Linux i386

samba3x

3.5.10-0.108.el5_8

samba3x-client

3.5.10-0.108.el5_8

samba3x-common

3.5.10-0.108.el5_8

samba3x-doc

3.5.10-0.108.el5_8

samba3x-domainjoin-gui

3.5.10-0.108.el5_8

samba3x-swat

3.5.10-0.108.el5_8

samba3x-winbind

3.5.10-0.108.el5_8

samba3x-winbind-devel

3.5.10-0.108.el5_8

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

github
больше 3 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.