Количество 13
Количество 13

CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
CVE-2015-0240
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ...

SUSE-SU-2015:0371-1
Security update for Samba

SUSE-SU-2015:0353-1
Security update for samba
GHSA-wjcr-wjqx-g6rq
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
ELSA-2015-0252
ELSA-2015-0252: samba security update (IMPORTANT)
ELSA-2015-0251
ELSA-2015-0251: samba security update (CRITICAL)
ELSA-2015-0250
ELSA-2015-0250: samba4 security update (CRITICAL)
ELSA-2015-0249
ELSA-2015-0249: samba3x security update (CRITICAL)

BDU:2015-10377
Уязвимость функции the _netr_ServerPasswordSet пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код c привилегиями администратора

SUSE-SU-2015:0386-1
Security update for Samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 10 | 92% Критический | больше 10 лет назад |
![]() | CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 7.9 | 92% Критический | больше 10 лет назад |
![]() | CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | CVSS2: 10 | 92% Критический | больше 10 лет назад |
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ... | CVSS2: 10 | 92% Критический | больше 10 лет назад | |
![]() | SUSE-SU-2015:0371-1 Security update for Samba | 92% Критический | больше 10 лет назад | |
![]() | SUSE-SU-2015:0353-1 Security update for samba | 92% Критический | больше 10 лет назад | |
GHSA-wjcr-wjqx-g6rq The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. | 92% Критический | больше 3 лет назад | ||
ELSA-2015-0252 ELSA-2015-0252: samba security update (IMPORTANT) | больше 10 лет назад | |||
ELSA-2015-0251 ELSA-2015-0251: samba security update (CRITICAL) | больше 10 лет назад | |||
ELSA-2015-0250 ELSA-2015-0250: samba4 security update (CRITICAL) | больше 10 лет назад | |||
ELSA-2015-0249 ELSA-2015-0249: samba3x security update (CRITICAL) | больше 10 лет назад | |||
![]() | BDU:2015-10377 Уязвимость функции the _netr_ServerPasswordSet пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код c привилегиями администратора | CVSS3: 10 | 92% Критический | больше 10 лет назад |
![]() | SUSE-SU-2015:0386-1 Security update for Samba | больше 11 лет назад |
Уязвимостей на страницу