Page 21 of 116 results (0.005 seconds)

CVSS: 10.0EPSS: 96%CPEs: 29EXPL: 3

Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/9936 https://www.exploit-db.com/exploits/16321 https://www.exploit-db.com/exploits/22356 ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I http://marc.info/?l=bugtraq&m=104792646416629&w=2 http://marc.info/?l=bugtraq&m=104792723017768&w=2 http://marc.info/?l=bugtraq&m=104801012929374&w=2 http://secunia.com/advisories/8299 http://secunia.com/advisories/8303 http://www.debian.org/security/2003/dsa-262 h •

CVSS: 1.2EPSS: 0%CPEs: 22EXPL: 0

The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. • ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I http://marc.info/?l=bugtraq&m=104792646416629&w=2 http://marc.info/?l=bugtraq&m=104801012929374&w=2 http://secunia.com/advisories/8299 http://secunia.com/advisories/8303 http://www.debian.org/security/2003/dsa-262 http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:032 http://www.novell.com/linux/security/advisories/2003_016_samba •

CVSS: 7.5EPSS: 7%CPEs: 21EXPL: 0

Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc http://lists.samba.org/archive/samba-technical/2002-June/022075.html http://rhn.redhat.com/errata/RHBA-2002-209.html http://www.iss.net/security_center/static/10010.php http://www.securityfocus.com/bid/5587 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 14%CPEs: 27EXPL: 0

Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string. Desbordamiento de búfer en Samba 2.2.2 a 2.2.6 permite a atacantes remotos causar una denegación de servicio y posíblemente ejecutar código arbitrario mediante una contraseña cifrada que causa un desbordamiento durante el descifrado en la cual una cadena de página de códigos DOS es convertida a una cadena unicode UCS2 little-endian. • ftp://patches.sgi.com/support/free/security/advisories/20021204-01-I http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000550 http://marc.info/?l=bugtraq&m=103801986818076&w=2 http://marc.info/?l=bugtraq&m=103859045302448&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/53580 http://us1.samba.org/samba/whatsnew/samba-2.2.7.html http://www.ciac.org/ciac/bulletins/n-019.shtml http://www.ciac.org/ciac/bulletins/n-023.shtml http://www. •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 3

Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. • https://www.exploit-db.com/exploits/20968 ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P http://ciac.llnl.gov/ciac/bulletins/l-105.shtml http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000405 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01 http://us1.samba.org/samba/whatsnew/macroexploit.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt http://www.debian.org/security/2001/dsa-065 http: •