Описание
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | not-affected  | |
| devel | released  | 3.0.25b-1ubuntu4 | 
| edgy | not-affected  | |
| feisty | not-affected  | |
| upstream | needs-triage  | 
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
The process_logon_packet function in the nmbd server for Samba 3.0.6 a ...
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
EPSS
5 Medium
CVSS2