Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3069

Опубликовано: 15 сент. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.5

Описание

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.13
devel

released

2:3.5.4~dfsg-1ubuntu5
hardy

released

3.0.28a-1ubuntu4.13
jaunty

released

2:3.3.2-1ubuntu3.6
karmic

released

2:3.4.0-3ubuntu5.7
lucid

released

2:3.4.7~dfsg-1ubuntu3.2
upstream

released

3.5.5

Показывать по

EPSS

Процентиль: 97%
0.39492
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

nvd
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

debian
почти 15 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...

github
около 3 лет назад

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

oracle-oval
больше 14 лет назад

ELSA-2010-0860: samba security update (CRITICAL)

EPSS

Процентиль: 97%
0.39492
Средний

7.5 High

CVSS2