Количество 14
Количество 14
CVE-2019-14907
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
CVE-2019-14907
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
CVE-2019-14907
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
CVE-2019-14907
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11 ...
SUSE-SU-2020:0233-1
Security update for samba
SUSE-SU-2020:0152-1
Security update for samba
GHSA-qw9p-wf2h-j96q
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
ELSA-2020-3981
ELSA-2020-3981: samba security, bug fix, and enhancement update (MODERATE)
BDU:2021-01767
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2020:0224-1
Security update for samba
openSUSE-SU-2020:0122-1
Security update for samba
SUSE-SU-2020:0223-1
Security update for samba
ELSA-2020-1878
ELSA-2020-1878: samba security, bug fix, and enhancement update (MODERATE)
SUSE-SU-2020:2673-1
Security update for samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-14907 All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). | CVSS3: 6.5 | 10% Средний | около 6 лет назад | |
CVE-2019-14907 All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). | CVSS3: 6.5 | 10% Средний | около 6 лет назад | |
CVE-2019-14907 All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). | CVSS3: 6.5 | 10% Средний | около 6 лет назад | |
CVE-2019-14907 All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11 ... | CVSS3: 6.5 | 10% Средний | около 6 лет назад | |
SUSE-SU-2020:0233-1 Security update for samba | 10% Средний | около 6 лет назад | ||
SUSE-SU-2020:0152-1 Security update for samba | 10% Средний | около 6 лет назад | ||
GHSA-qw9p-wf2h-j96q All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). | CVSS3: 6.5 | 10% Средний | больше 3 лет назад | |
ELSA-2020-3981 ELSA-2020-3981: samba security, bug fix, and enhancement update (MODERATE) | больше 5 лет назад | |||
BDU:2021-01767 Уязвимость пакета программ сетевого взаимодействия Samba, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 10% Средний | около 6 лет назад | |
SUSE-SU-2020:0224-1 Security update for samba | около 6 лет назад | |||
openSUSE-SU-2020:0122-1 Security update for samba | около 6 лет назад | |||
SUSE-SU-2020:0223-1 Security update for samba | около 6 лет назад | |||
ELSA-2020-1878 ELSA-2020-1878: samba security, bug fix, and enhancement update (MODERATE) | почти 6 лет назад | |||
SUSE-SU-2020:2673-1 Security update for samba | больше 5 лет назад |
Уязвимостей на страницу