Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1105

Опубликовано: 29 мая 2008
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 7.5

Описание

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.7
devel

released

1:3.0.30-1
feisty

released

3.0.24-2ubuntu1.6
gutsy

released

3.0.26a-1ubuntu2.4
hardy

released

3.0.28a-1ubuntu4.2
upstream

released

3.0.30

Показывать по

EPSS

Процентиль: 99%
0.87419
Высокий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

nvd
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

debian
больше 17 лет назад

Heap-based buffer overflow in the receive_smb_raw function in util/soc ...

github
почти 4 года назад

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

oracle-oval
больше 17 лет назад

ELSA-2008-0290: samba security and bug fix update (CRITICAL)

EPSS

Процентиль: 99%
0.87419
Высокий

7.5 High

CVSS2