Количество 36
Количество 36
ELSA-2018-3056
ELSA-2018-3056: samba security, bug fix, and enhancement update (MODERATE)

openSUSE-SU-2018:2400-1
Security update for samba

SUSE-SU-2018:2318-1
Security update for samba

SUSE-SU-2018:2339-2
Security update for samba

SUSE-SU-2018:2339-1
Security update for samba

CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.

CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.

CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the u ...

SUSE-SU-2018:2321-1
Security update for samba
GHSA-xxm3-fp55-pm48
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.

BDU:2020-00693
Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным

CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.

CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.

CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed ex ...

CVE-2018-1050
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVE-2018-1050
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVE-2018-1050
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVE-2018-1050
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2018-3056 ELSA-2018-3056: samba security, bug fix, and enhancement update (MODERATE) | почти 7 лет назад | |||
![]() | openSUSE-SU-2018:2400-1 Security update for samba | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2318-1 Security update for samba | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2339-2 Security update for samba | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2339-1 Security update for samba | почти 7 лет назад | ||
![]() | CVE-2018-1139 A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client. | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-1139 A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client. | CVSS3: 5.4 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-1139 A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client. | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад |
CVE-2018-1139 A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the u ... | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2321-1 Security update for samba | почти 7 лет назад | ||
GHSA-xxm3-fp55-pm48 A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client. | CVSS3: 8.1 | 2% Низкий | около 3 лет назад | |
![]() | BDU:2020-00693 Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-10858 A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable. | CVSS3: 4.3 | 7% Низкий | почти 7 лет назад |
![]() | CVE-2018-10858 A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable. | CVSS3: 4.3 | 7% Низкий | почти 7 лет назад |
![]() | CVE-2018-10858 A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable. | CVSS3: 4.3 | 7% Низкий | почти 7 лет назад |
CVE-2018-10858 A heap-buffer overflow was found in the way samba clients processed ex ... | CVSS3: 4.3 | 7% Низкий | почти 7 лет назад | |
![]() | CVE-2018-1050 All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash. | CVSS3: 4.3 | 24% Средний | больше 7 лет назад |
![]() | CVE-2018-1050 All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash. | CVSS3: 4.3 | 24% Средний | больше 7 лет назад |
![]() | CVE-2018-1050 All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash. | CVSS3: 4.3 | 24% Средний | больше 7 лет назад |
![]() | CVSS3: 4.3 | 24% Средний | больше 3 лет назад |
Уязвимостей на страницу