Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-6015

Опубликовано: 13 дек. 2007
Источник: ubuntu
Приоритет: medium
CVSS2: 9.3

Описание

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.6
devel

not-affected

edgy

released

3.0.22-1ubuntu4.5
feisty

released

3.0.24-2ubuntu1.5
gutsy

released

3.0.26a-1ubuntu2.3
upstream

released

3.0.28

Показывать по

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

nvd
больше 17 лет назад

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

debian
больше 17 лет назад

Stack-based buffer overflow in the send_mailslot function in nmbd in S ...

github
около 3 лет назад

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

oracle-oval
больше 17 лет назад

ELSA-2007-1114: Critical: samba security and bug fix update (CRITICAL)

9.3 Critical

CVSS2