Описание
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.0.22-1ubuntu3.7 |
devel | not-affected | 3.0.28-1ubuntu2 |
edgy | ignored | end of life, was needed |
feisty | released | 3.0.24-2ubuntu1.6 |
gutsy | released | 3.0.26a-1ubuntu2.4 |
hardy | not-affected | 3.0.28-1ubuntu2 |
upstream | released | 3.0.27a |
Показывать по
EPSS
9.3 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, wh ...
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
9.3 Critical
CVSS2