Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4572

Опубликовано: 16 нояб. 2007
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 9.3

Описание

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.7
devel

not-affected

3.0.28-1ubuntu2
edgy

ignored

end of life, was needed
feisty

released

3.0.24-2ubuntu1.6
gutsy

released

3.0.26a-1ubuntu2.4
hardy

not-affected

3.0.28-1ubuntu2
upstream

released

3.0.27a

Показывать по

EPSS

Процентиль: 96%
0.27399
Средний

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

nvd
больше 17 лет назад

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

debian
больше 17 лет назад

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, wh ...

github
около 3 лет назад

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

fstec
больше 17 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.27399
Средний

9.3 Critical

CVSS2