Логотип exploitDog
bind:CVE-2019-14907
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-14907

Количество 14

Количество 14

ubuntu логотип

CVE-2019-14907

около 6 лет назад

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2019-14907

около 6 лет назад

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-14907

около 6 лет назад

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2019-14907

около 6 лет назад

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11 ...

CVSS3: 6.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0233-1

около 6 лет назад

Security update for samba

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0152-1

около 6 лет назад

Security update for samba

EPSS: Средний
github логотип

GHSA-qw9p-wf2h-j96q

больше 3 лет назад

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
EPSS: Средний
oracle-oval логотип

ELSA-2020-3981

больше 5 лет назад

ELSA-2020-3981: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2021-01767

около 6 лет назад

Уязвимость пакета программ сетевого взаимодействия Samba, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0224-1

около 6 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0122-1

около 6 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0223-1

около 6 лет назад

Security update for samba

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1878

почти 6 лет назад

ELSA-2020-1878: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2673-1

больше 5 лет назад

Security update for samba

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
10%
Средний
около 6 лет назад
redhat логотип
CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
10%
Средний
около 6 лет назад
nvd логотип
CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
10%
Средний
около 6 лет назад
debian логотип
CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11 ...

CVSS3: 6.5
10%
Средний
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0233-1

Security update for samba

10%
Средний
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0152-1

Security update for samba

10%
Средний
около 6 лет назад
github логотип
GHSA-qw9p-wf2h-j96q

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

CVSS3: 6.5
10%
Средний
больше 3 лет назад
oracle-oval логотип
ELSA-2020-3981

ELSA-2020-3981: samba security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
fstec логотип
BDU:2021-01767

Уязвимость пакета программ сетевого взаимодействия Samba, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
10%
Средний
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0224-1

Security update for samba

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0122-1

Security update for samba

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0223-1

Security update for samba

около 6 лет назад
oracle-oval логотип
ELSA-2020-1878

ELSA-2020-1878: samba security, bug fix, and enhancement update (MODERATE)

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:2673-1

Security update for samba

больше 5 лет назад

Уязвимостей на страницу