Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-1182

Опубликовано: 10 апр. 2012
Источник: redhat
CVSS2: 8.3
EPSS Высокий

Описание

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-228->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=804093samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output

EPSS

Процентиль: 99%
0.76396
Высокий

8.3 High

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

github
больше 3 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

oracle-oval
больше 12 лет назад

ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 99%
0.76396
Высокий

8.3 High

CVSS2