Описание
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.0.22-1ubuntu3.12 |
devel | not-affected | |
hardy | released | 3.0.28a-1ubuntu4.12 |
jaunty | released | 2:3.3.2-1ubuntu3.5 |
karmic | not-affected | |
lucid | not-affected | |
upstream | not-affected |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
Buffer overflow in the SMB1 packet chaining implementation in the chai ...
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
ELSA-2010-0488: samba and samba3x security update (CRITICAL)
EPSS
7.5 High
CVSS2