Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1543

Опубликовано: 25 нояб. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-1543: samba4 security and bug fix update (MODERATE)

[4.0.0-58.rc4]

  • Fix winbind lsat reconnection code, avoids ntlmv2-only session setup problems
  • resolves: #949993

[4.0.0-57.rc4]

  • resolves: #984809 - CVE-2013-4124: DoS via integer overflow when reading an EA list

[4.0.0-56.rc4]

  • Fix libwbclient.so.0 symlink.
  • resolves: #882338
  • Fix correct linking of libreplace with cmdline-credentials.
  • resolves: #911264

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

samba4

4.0.0-58.el6.rc4

samba4-client

4.0.0-58.el6.rc4

samba4-common

4.0.0-58.el6.rc4

samba4-dc

4.0.0-58.el6.rc4

samba4-dc-libs

4.0.0-58.el6.rc4

samba4-devel

4.0.0-58.el6.rc4

samba4-libs

4.0.0-58.el6.rc4

samba4-pidl

4.0.0-58.el6.rc4

samba4-python

4.0.0-58.el6.rc4

samba4-swat

4.0.0-58.el6.rc4

samba4-test

4.0.0-58.el6.rc4

samba4-winbind

4.0.0-58.el6.rc4

samba4-winbind-clients

4.0.0-58.el6.rc4

samba4-winbind-krb5-locator

4.0.0-58.el6.rc4

Oracle Linux i686

samba4

4.0.0-58.el6.rc4

samba4-client

4.0.0-58.el6.rc4

samba4-common

4.0.0-58.el6.rc4

samba4-dc

4.0.0-58.el6.rc4

samba4-dc-libs

4.0.0-58.el6.rc4

samba4-devel

4.0.0-58.el6.rc4

samba4-libs

4.0.0-58.el6.rc4

samba4-pidl

4.0.0-58.el6.rc4

samba4-python

4.0.0-58.el6.rc4

samba4-swat

4.0.0-58.el6.rc4

samba4-test

4.0.0-58.el6.rc4

samba4-winbind

4.0.0-58.el6.rc4

samba4-winbind-clients

4.0.0-58.el6.rc4

samba4-winbind-krb5-locator

4.0.0-58.el6.rc4

Связанные CVE

Связанные уязвимости

ubuntu
около 12 лет назад

Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.

redhat
около 12 лет назад

Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.

nvd
около 12 лет назад

Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.

debian
около 12 лет назад

Integer overflow in the read_nttrans_ea_list function in nttrans.c in ...

github
больше 3 лет назад

Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.