Описание
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.0.22-1ubuntu3.6 |
devel | not-affected | |
edgy | released | 3.0.22-1ubuntu4.5 |
feisty | released | 3.0.24-2ubuntu1.5 |
gutsy | released | 3.0.26a-1ubuntu2.3 |
upstream | released | 3.0.28 |
Показывать по
9.3 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
Stack-based buffer overflow in the send_mailslot function in nmbd in S ...
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
ELSA-2007-1114: Critical: samba security and bug fix update (CRITICAL)
9.3 Critical
CVSS2