Описание
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/xenial | not-affected | 2:6.4-1ubuntu1.1 |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | not-affected | code not present |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | not-affected | code not present |
| trusty/esm | not-affected | code not present |
Показывать по
10 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils ...
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
10 Critical
CVSS2