Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1635

Опубликовано: 17 июн. 2010
Источник: ubuntu
Приоритет: negligible
EPSS Средний
CVSS2: 5

Описание

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

РелизСтатусПримечание
dapper

ignored

devel

not-affected

2:3.5.3~dfsg-0ubuntu4
hardy

ignored

jaunty

ignored

karmic

ignored

lucid

ignored

upstream

released

3.5.2

Показывать по

Ссылки на источники

EPSS

Процентиль: 94%
0.12656
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

nvd
больше 15 лет назад

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

debian
больше 15 лет назад

The chain_reply function in process.c in smbd in Samba before 3.4.8 an ...

github
больше 3 лет назад

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

fstec
больше 13 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 94%
0.12656
Средний

5 Medium

CVSS2