Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4408

Опубликовано: 09 дек. 2013
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

Отчет

This issue does not affect the version of samba as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sambaNot affected
Red Hat Enterprise Linux 7sambaNot affected
Red Hat Enterprise Linux 5samba3xFixedRHSA-2013:180610.12.2013
Red Hat Enterprise Linux 6samba4FixedRHSA-2013:180509.12.2013
Red Hat Enterprise Linux 6sambaFixedRHSA-2013:180610.12.2013
Red Hat Storage 2.1sambaFixedRHSA-2014:000906.01.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-130->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1018032samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check

EPSS

Процентиль: 85%
0.02652
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

nvd
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

debian
больше 11 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done functi ...

github
около 3 лет назад

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

oracle-oval
больше 11 лет назад

ELSA-2013-1805: samba4 security update (IMPORTANT)

EPSS

Процентиль: 85%
0.02652
Низкий

6.8 Medium

CVSS2