Количество 14
Количество 14
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
CVE-2020-14383
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could us ...
GHSA-9hpm-fmxg-j5xc
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
BDU:2022-05695
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с непроверенным состоянием ошибки, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2020:1819-1
Security update for samba
openSUSE-SU-2020:1811-1
Security update for samba
SUSE-SU-2020:3093-1
Security update for samba
SUSE-SU-2020:3092-1
Security update for samba
SUSE-SU-2020:3087-1
Security update for samba
SUSE-SU-2020:3082-1
Security update for samba
SUSE-SU-2020:3081-1
Security update for samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-14383 A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not. | CVSS3: 6.5 | 0% Низкий | около 5 лет назад | |
CVE-2020-14383 A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-14383 A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not. | CVSS3: 6.5 | 0% Низкий | около 5 лет назад | |
CVSS3: 6.5 | 0% Низкий | больше 1 года назад | ||
CVE-2020-14383 A flaw was found in samba's DNS server. An authenticated user could us ... | CVSS3: 6.5 | 0% Низкий | около 5 лет назад | |
GHSA-9hpm-fmxg-j5xc A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
BDU:2022-05695 Уязвимость пакета программ сетевого взаимодействия Samba, связанная с непроверенным состоянием ошибки, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
openSUSE-SU-2020:1819-1 Security update for samba | больше 5 лет назад | |||
openSUSE-SU-2020:1811-1 Security update for samba | больше 5 лет назад | |||
SUSE-SU-2020:3093-1 Security update for samba | больше 5 лет назад | |||
SUSE-SU-2020:3092-1 Security update for samba | больше 5 лет назад | |||
SUSE-SU-2020:3087-1 Security update for samba | больше 5 лет назад | |||
SUSE-SU-2020:3082-1 Security update for samba | больше 5 лет назад | |||
SUSE-SU-2020:3081-1 Security update for samba | больше 5 лет назад |
Уязвимостей на страницу