Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1105

Опубликовано: 28 мая 2008
Источник: redhat

Описание

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Дополнительная информация

Статус:

Critical

Связанные уязвимости

ubuntu
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

nvd
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

debian
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/soc ...

github
больше 3 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

oracle-oval
больше 17 лет назад

ELSA-2008-0290: samba security and bug fix update (CRITICAL)