Логотип exploitDog
bind:"CVE-2023-34968" OR bind:"CVE-2023-34967" OR bind:"CVE-2023-34966" OR bind:"CVE-2022-2127"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-34968" OR bind:"CVE-2023-34967" OR bind:"CVE-2023-34966" OR bind:"CVE-2022-2127"

Количество 35

Количество 35

suse-cvrf логотип

SUSE-SU-2023:3060-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2930-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2888-1

около 2 лет назад

Security update for samba

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7139

почти 2 года назад

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6667

почти 2 года назад

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2929-1

около 2 лет назад

Security update for samba

EPSS: Низкий
redos логотип

ROS-20230920-02

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20230920-01

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-34968

около 2 лет назад

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-34968

около 2 лет назад

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-34968

около 2 лет назад

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-34968

около 2 лет назад

A path disclosure vulnerability was found in Samba. As part of the Spo ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-cfhp-p6xr-24g5

около 2 лет назад

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-06935

около 2 лет назад

Уязвимость пакета программ сетевого взаимодействия Samba, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
debian логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-86p4-vhr6-2vv3

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
fstec логотип

BDU:2023-09107

около 2 лет назад

Уязвимость функции dalloc_value_for_key() пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:3060-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2930-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2888-1

Security update for samba

около 2 лет назад
oracle-oval логотип
ELSA-2023-7139

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6667

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2929-1

Security update for samba

около 2 лет назад
redos логотип
ROS-20230920-02

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад
redos логотип
ROS-20230920-01

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад
ubuntu логотип
CVE-2023-34968

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
2%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-34968

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
2%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-34968

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
2%
Низкий
около 2 лет назад
debian логотип
CVE-2023-34968

A path disclosure vulnerability was found in Samba. As part of the Spo ...

CVSS3: 5.3
2%
Низкий
около 2 лет назад
github логотип
GHSA-cfhp-p6xr-24g5

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.

CVSS3: 5.3
2%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-06935

Уязвимость пакета программ сетевого взаимодействия Samba, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.3
2%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
redhat логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
nvd логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
debian логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 5.3
19%
Средний
около 2 лет назад
github логотип
GHSA-86p4-vhr6-2vv3

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
fstec логотип
BDU:2023-09107

Уязвимость функции dalloc_value_for_key() пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
19%
Средний
около 2 лет назад

Уязвимостей на страницу