Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2063

Опубликовано: 17 июн. 2010
Источник: ubuntu
Приоритет: high
EPSS Высокий
CVSS2: 7.5

Описание

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.12
devel

not-affected

hardy

released

3.0.28a-1ubuntu4.12
jaunty

released

2:3.3.2-1ubuntu3.5
karmic

not-affected

lucid

not-affected

upstream

not-affected

Показывать по

EPSS

Процентиль: 99%
0.80174
Высокий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

nvd
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

debian
около 15 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chai ...

github
больше 3 лет назад

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

oracle-oval
около 15 лет назад

ELSA-2010-0488: samba and samba3x security update (CRITICAL)

EPSS

Процентиль: 99%
0.80174
Высокий

7.5 High

CVSS2