Логотип exploitDog
bind:CVE-2023-34966
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-34966

Количество 14

Количество 14

ubuntu логотип

CVE-2023-34966

около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2023-34966

около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2023-34966

около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2023-34966

около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-45c7-642q-qm9m

около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2023-04385

около 2 лет назад

Уязвимость функции sl_unpack_loop() службы mdssvc RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:3060-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2930-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2888-1

около 2 лет назад

Security update for samba

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7139

почти 2 года назад

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6667

почти 2 года назад

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2929-1

около 2 лет назад

Security update for samba

EPSS: Низкий
redos логотип

ROS-20230920-02

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20230920-01

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-34966

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
14%
Средний
около 2 лет назад
redhat логотип
CVE-2023-34966

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
14%
Средний
около 2 лет назад
nvd логотип
CVE-2023-34966

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
14%
Средний
около 2 лет назад
debian логотип
CVE-2023-34966

An infinite loop vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 7.5
14%
Средний
около 2 лет назад
github логотип
GHSA-45c7-642q-qm9m

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
14%
Средний
около 2 лет назад
fstec логотип
BDU:2023-04385

Уязвимость функции sl_unpack_loop() службы mdssvc RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
14%
Средний
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3060-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2930-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2888-1

Security update for samba

около 2 лет назад
oracle-oval логотип
ELSA-2023-7139

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6667

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2929-1

Security update for samba

около 2 лет назад
redos логотип
ROS-20230920-02

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад
redos логотип
ROS-20230920-01

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад

Уязвимостей на страницу