Описание
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | samba | Will not fix | ||
| Red Hat Enterprise Linux 5 | samba3x | Will not fix | ||
| Red Hat Enterprise Linux 6 | cifs-utils | Will not fix | ||
| Red Hat Enterprise Linux 7 | cifs-utils | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
5.2 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils ...
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
EPSS
5.2 Medium
CVSS2