Описание
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | released  | 3.0.22-1ubuntu3.5 | 
| devel | not-affected  | 3.0.27a-2 | 
| edgy | released  | 3.0.22-1ubuntu4.4 | 
| feisty | released  | 3.0.24-2ubuntu1.4 | 
| gutsy | released  | 3.0.26a-1ubuntu2.2 | 
| upstream | released  | 3.0.27 | 
Показывать по
9.3 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
Stack-based buffer overflow in the reply_netbios_packet function in nm ...
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
9.3 Critical
CVSS2