Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3069

Опубликовано: 14 сент. 2010
Источник: redhat
CVSS2: 8.3

Описание

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-129->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=630869Samba: Stack-based buffer overflow by processing specially-crafted SID records

8.3 High

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

nvd
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

debian
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...

github
около 3 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

oracle-oval
больше 14 лет назад

ELSA-2010-0860: samba security update (CRITICAL)

8.3 High

CVSS2

Уязвимость CVE-2010-3069