Логотип exploitDog
bind:CVE-2023-34967
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-34967

Количество 14

Количество 14

ubuntu логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
debian логотип

CVE-2023-34967

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-86p4-vhr6-2vv3

около 2 лет назад

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
EPSS: Средний
fstec логотип

BDU:2023-09107

около 2 лет назад

Уязвимость функции dalloc_value_for_key() пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:3060-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2930-1

около 2 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2888-1

около 2 лет назад

Security update for samba

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7139

почти 2 года назад

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6667

почти 2 года назад

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2929-1

около 2 лет назад

Security update for samba

EPSS: Низкий
redos логотип

ROS-20230920-02

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20230920-01

почти 2 года назад

Множественные уязвимости samba

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
redhat логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
nvd логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
debian логотип
CVE-2023-34967

A Type Confusion vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 5.3
19%
Средний
около 2 лет назад
github логотип
GHSA-86p4-vhr6-2vv3

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

CVSS3: 5.3
19%
Средний
около 2 лет назад
fstec логотип
BDU:2023-09107

Уязвимость функции dalloc_value_for_key() пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
19%
Средний
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3060-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2930-1

Security update for samba

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2888-1

Security update for samba

около 2 лет назад
oracle-oval логотип
ELSA-2023-7139

ELSA-2023-7139: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6667

ELSA-2023-6667: samba security, bug fix, and enhancement update (MODERATE)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2929-1

Security update for samba

около 2 лет назад
redos логотип
ROS-20230920-02

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад
redos логотип
ROS-20230920-01

Множественные уязвимости samba

CVSS3: 7.5
почти 2 года назад

Уязвимостей на страницу