Количество 14
Количество 14

CVE-2023-34966
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVE-2023-34966
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVE-2023-34966
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
CVE-2023-34966
An infinite loop vulnerability was found in Samba's mdssvc RPC service ...
GHSA-45c7-642q-qm9m
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

BDU:2023-04385
Уязвимость функции sl_unpack_loop() службы mdssvc RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:3060-1
Security update for samba

SUSE-SU-2023:2930-1
Security update for samba

SUSE-SU-2023:2888-1
Security update for samba
ELSA-2023-7139
ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)
ELSA-2023-6667
ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2023:2929-1
Security update for samba

ROS-20230920-02
Множественные уязвимости samba

ROS-20230920-01
Множественные уязвимости samba
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-34966 An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. | CVSS3: 7.5 | 14% Средний | около 2 лет назад |
![]() | CVE-2023-34966 An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. | CVSS3: 7.5 | 14% Средний | около 2 лет назад |
![]() | CVE-2023-34966 An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. | CVSS3: 7.5 | 14% Средний | около 2 лет назад |
CVE-2023-34966 An infinite loop vulnerability was found in Samba's mdssvc RPC service ... | CVSS3: 7.5 | 14% Средний | около 2 лет назад | |
GHSA-45c7-642q-qm9m An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. | CVSS3: 7.5 | 14% Средний | около 2 лет назад | |
![]() | BDU:2023-04385 Уязвимость функции sl_unpack_loop() службы mdssvc RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 14% Средний | около 2 лет назад |
![]() | SUSE-SU-2023:3060-1 Security update for samba | около 2 лет назад | ||
![]() | SUSE-SU-2023:2930-1 Security update for samba | около 2 лет назад | ||
![]() | SUSE-SU-2023:2888-1 Security update for samba | около 2 лет назад | ||
ELSA-2023-7139 ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
ELSA-2023-6667 ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
![]() | SUSE-SU-2023:2929-1 Security update for samba | около 2 лет назад | ||
![]() | ROS-20230920-02 Множественные уязвимости samba | CVSS3: 7.5 | почти 2 года назад | |
![]() | ROS-20230920-01 Множественные уязвимости samba | CVSS3: 7.5 | почти 2 года назад |
Уязвимостей на страницу