Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2063

Опубликовано: 16 июн. 2010
Источник: redhat
CVSS2: 7.5
EPSS Высокий

Описание

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=601419samba: memory corruption vulnerability

EPSS

Процентиль: 99%
0.79344
Высокий

7.5 High

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

nvd
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

debian
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chai ...

github
около 3 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

oracle-oval
около 15 лет назад

ELSA-2010-0488: samba and samba3x security update (CRITICAL)

EPSS

Процентиль: 99%
0.79344
Высокий

7.5 High

CVSS2