Page 36 of 211 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions. Desbordamiento de búfer en la librería nss_winbind.so.1 de Samba 3.0.21 hasta 3.0.23d, como se usa en el demonio winbindd de Solaris, permite a los atacantes ejecutar código de su elección a través de las funciones (1) gethostbyame y (2) getipnodebyname. • http://osvdb.org/33098 http://secunia.com/advisories/24043 http://secunia.com/advisories/24101 http://secunia.com/advisories/24151 http://securitytracker.com/id?1017589 http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916 http://us1.samba.org/samba/security/CVE-2007-0453.html http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html http://www.securityfocus.com/archive/1/459168/100/0/threaded http://www.securityfocus.com/ar •

CVSS: 6.8EPSS: 0%CPEs: 22EXPL: 0

smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop. smbd en Samba 3.0.6 hasta 3.0.23d permite a usuarios autenticados remotamente provocar una denegación de servicio (agotamiento de memoria y CPU) renombrando un archivo de una forma que previene que una petición sea eliminada de la cola abierta referenciada, lo cual dispara un bucle infinito. • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc http://fedoranews.org/cms/node/2579 http://fedoranews.org/cms/node/2580 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462 http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html http://osvdb.org/33100 http://secunia.com/advisories/24021 http://secunia.com/advisories/24030 http://secunia.com/advisories/24046 http://secunia.com/advisories/24060 http://sec •

CVSS: 5.0EPSS: 17%CPEs: 27EXPL: 0

The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests. El demonio smdb (smbd/service.c) en Samba versiones 3.0.1 hasta la 3.0.22, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de un gran número de peticiones de conexión compartida. • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/20980 http://secunia.com/advisories/20983 http://secunia.com/advisories/21018 http://secunia.com/advisories/21019 http://secunia.com/advisories/21046 http://secunia.com/advisories/21086 http://secunia.com/advisories/21143 http://secunia.com/advisories&#x •

CVSS: 1.2EPSS: 0%CPEs: 4EXPL: 0

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain. • http://secunia.com/advisories/19455 http://secunia.com/advisories/19468 http://secunia.com/advisories/19539 http://securitytracker.com/id?1015850 http://us1.samba.org/samba/security/CAN-2006-1059.html http://www.osvdb.org/24263 http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00114.html http://www.securityfocus.com/archive/1/429370/100/0/threaded http://www.securityfocus.com/bid/17314 http://www.trustix.org/errata/2006/0018 http://www.vupen.com/e •

CVSS: 6.4EPSS: 0%CPEs: 37EXPL: 0

Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption). • http://www.samba.org/samba/history/samba-3.0.6.html http://www.trustix.org/errata/2004/0043 https://exchange.xforce.ibmcloud.com/vulnerabilities/17139 •