Описание
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | samba | Not affected | ||
Red Hat Enterprise Linux 5 | samba3x | Fixed | RHSA-2013:1310 | 30.09.2013 |
Red Hat Enterprise Linux 5 | samba | Fixed | RHSA-2014:0305 | 17.03.2014 |
Red Hat Enterprise Linux 6 | samba | Fixed | RHSA-2013:1542 | 20.11.2013 |
Red Hat Enterprise Linux 6 | samba4 | Fixed | RHSA-2013:1543 | 20.11.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Integer overflow in the read_nttrans_ea_list function in nttrans.c in ...
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
ELSA-2013-1543: samba4 security and bug fix update (MODERATE)
EPSS
4.3 Medium
CVSS2