Описание
ELSA-2013-1805: samba4 security update (IMPORTANT)
[4.0.0-60.rc4]
- resolves: #1018039 - Fix CVE-2013-4408.
[4.0.0-59.rc4]
- Fix usage of client min/max protocol options in winbindd
- related: #949993
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
samba4
4.0.0-60.el6_5.rc4
samba4-client
4.0.0-60.el6_5.rc4
samba4-common
4.0.0-60.el6_5.rc4
samba4-dc
4.0.0-60.el6_5.rc4
samba4-dc-libs
4.0.0-60.el6_5.rc4
samba4-devel
4.0.0-60.el6_5.rc4
samba4-libs
4.0.0-60.el6_5.rc4
samba4-pidl
4.0.0-60.el6_5.rc4
samba4-python
4.0.0-60.el6_5.rc4
samba4-swat
4.0.0-60.el6_5.rc4
samba4-test
4.0.0-60.el6_5.rc4
samba4-winbind
4.0.0-60.el6_5.rc4
samba4-winbind-clients
4.0.0-60.el6_5.rc4
samba4-winbind-krb5-locator
4.0.0-60.el6_5.rc4
Oracle Linux i686
samba4
4.0.0-60.el6_5.rc4
samba4-client
4.0.0-60.el6_5.rc4
samba4-common
4.0.0-60.el6_5.rc4
samba4-dc
4.0.0-60.el6_5.rc4
samba4-dc-libs
4.0.0-60.el6_5.rc4
samba4-devel
4.0.0-60.el6_5.rc4
samba4-libs
4.0.0-60.el6_5.rc4
samba4-pidl
4.0.0-60.el6_5.rc4
samba4-python
4.0.0-60.el6_5.rc4
samba4-swat
4.0.0-60.el6_5.rc4
samba4-test
4.0.0-60.el6_5.rc4
samba4-winbind
4.0.0-60.el6_5.rc4
samba4-winbind-clients
4.0.0-60.el6_5.rc4
samba4-winbind-krb5-locator
4.0.0-60.el6_5.rc4
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done functi ...
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.