Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1805

Опубликовано: 09 дек. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-1805: samba4 security update (IMPORTANT)

[4.0.0-60.rc4]

  • resolves: #1018039 - Fix CVE-2013-4408.

[4.0.0-59.rc4]

  • Fix usage of client min/max protocol options in winbindd
  • related: #949993

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

samba4

4.0.0-60.el6_5.rc4

samba4-client

4.0.0-60.el6_5.rc4

samba4-common

4.0.0-60.el6_5.rc4

samba4-dc

4.0.0-60.el6_5.rc4

samba4-dc-libs

4.0.0-60.el6_5.rc4

samba4-devel

4.0.0-60.el6_5.rc4

samba4-libs

4.0.0-60.el6_5.rc4

samba4-pidl

4.0.0-60.el6_5.rc4

samba4-python

4.0.0-60.el6_5.rc4

samba4-swat

4.0.0-60.el6_5.rc4

samba4-test

4.0.0-60.el6_5.rc4

samba4-winbind

4.0.0-60.el6_5.rc4

samba4-winbind-clients

4.0.0-60.el6_5.rc4

samba4-winbind-krb5-locator

4.0.0-60.el6_5.rc4

Oracle Linux i686

samba4

4.0.0-60.el6_5.rc4

samba4-client

4.0.0-60.el6_5.rc4

samba4-common

4.0.0-60.el6_5.rc4

samba4-dc

4.0.0-60.el6_5.rc4

samba4-dc-libs

4.0.0-60.el6_5.rc4

samba4-devel

4.0.0-60.el6_5.rc4

samba4-libs

4.0.0-60.el6_5.rc4

samba4-pidl

4.0.0-60.el6_5.rc4

samba4-python

4.0.0-60.el6_5.rc4

samba4-swat

4.0.0-60.el6_5.rc4

samba4-test

4.0.0-60.el6_5.rc4

samba4-winbind

4.0.0-60.el6_5.rc4

samba4-winbind-clients

4.0.0-60.el6_5.rc4

samba4-winbind-krb5-locator

4.0.0-60.el6_5.rc4

Связанные CVE

Связанные уязвимости

ubuntu
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

redhat
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

nvd
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

debian
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done functi ...

github
около 3 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.