Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-0249

Опубликовано: 23 фев. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2015-0249: samba3x security update (CRITICAL)

[3.6.23-9]

  • related: #1191608 - Update patchset for CVE-2015-0240.

[3.6.23-8]

  • resolves: #1191608 - CVE-2015-0240: RCE in netlogon.

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

samba3x

3.6.23-9.el5_11

samba3x-client

3.6.23-9.el5_11

samba3x-common

3.6.23-9.el5_11

samba3x-doc

3.6.23-9.el5_11

samba3x-domainjoin-gui

3.6.23-9.el5_11

samba3x-swat

3.6.23-9.el5_11

samba3x-winbind

3.6.23-9.el5_11

samba3x-winbind-devel

3.6.23-9.el5_11

Oracle Linux x86_64

samba3x

3.6.23-9.el5_11

samba3x-client

3.6.23-9.el5_11

samba3x-common

3.6.23-9.el5_11

samba3x-doc

3.6.23-9.el5_11

samba3x-domainjoin-gui

3.6.23-9.el5_11

samba3x-swat

3.6.23-9.el5_11

samba3x-winbind

3.6.23-9.el5_11

samba3x-winbind-devel

3.6.23-9.el5_11

Oracle Linux i386

samba3x

3.6.23-9.el5_11

samba3x-client

3.6.23-9.el5_11

samba3x-common

3.6.23-9.el5_11

samba3x-doc

3.6.23-9.el5_11

samba3x-domainjoin-gui

3.6.23-9.el5_11

samba3x-swat

3.6.23-9.el5_11

samba3x-winbind

3.6.23-9.el5_11

samba3x-winbind-devel

3.6.23-9.el5_11

Связанные CVE

Связанные уязвимости

ubuntu
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

redhat
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

nvd
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

debian
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ...

suse-cvrf
больше 10 лет назад

Security update for Samba