Описание
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.0.22-1ubuntu3.13 |
devel | released | 2:3.5.4~dfsg-1ubuntu5 |
hardy | released | 3.0.28a-1ubuntu4.13 |
jaunty | released | 2:3.3.2-1ubuntu3.6 |
karmic | released | 2:3.4.0-3ubuntu5.7 |
lucid | released | 2:3.4.7~dfsg-1ubuntu3.2 |
upstream | released | 3.5.5 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
EPSS
7.5 High
CVSS2