Количество 13
Количество 13
CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ...
SUSE-SU-2015:0371-1
Security update for Samba
SUSE-SU-2015:0353-1
Security update for samba
GHSA-wjcr-wjqx-g6rq
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
ELSA-2015-0252
ELSA-2015-0252: samba security update (IMPORTANT)
ELSA-2015-0251
ELSA-2015-0251: samba security update (CRITICAL)
ELSA-2015-0250
ELSA-2015-0250: samba4 security update (CRITICAL)
ELSA-2015-0249
ELSA-2015-0249: samba3x security update (CRITICAL)
BDU:2015-10377
Уязвимость функции the _netr_ServerPasswordSet пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код c привилегиями администратора
SUSE-SU-2015:0386-1
Security update for Samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 10 | 90% Высокий | почти 11 лет назад | |
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 7.9 | 90% Высокий | почти 11 лет назад | |
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 10 | 90% Высокий | почти 11 лет назад | |
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ... | CVSS2: 10 | 90% Высокий | почти 11 лет назад | |
SUSE-SU-2015:0371-1 Security update for Samba | 90% Высокий | почти 11 лет назад | ||
SUSE-SU-2015:0353-1 Security update for samba | 90% Высокий | почти 11 лет назад | ||
GHSA-wjcr-wjqx-g6rq The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | 90% Высокий | больше 3 лет назад | ||
ELSA-2015-0252 ELSA-2015-0252: samba security update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2015-0251 ELSA-2015-0251: samba security update (CRITICAL) | почти 11 лет назад | |||
ELSA-2015-0250 ELSA-2015-0250: samba4 security update (CRITICAL) | почти 11 лет назад | |||
ELSA-2015-0249 ELSA-2015-0249: samba3x security update (CRITICAL) | почти 11 лет назад | |||
BDU:2015-10377 Уязвимость функции the _netr_ServerPasswordSet пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код c привилегиями администратора | CVSS3: 10 | 90% Высокий | почти 11 лет назад | |
SUSE-SU-2015:0386-1 Security update for Samba | около 12 лет назад |
Уязвимостей на страницу