Page 9 of 48 results (0.006 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 1

Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201. • http://www.redhat.com/support/errata/RHSA-2003-096.html http://www.securiteam.com/exploits/5TP0M2AAKS.html https://exchange.xforce.ibmcloud.com/vulnerabilities/12749 https://access.redhat.com/security/cve/CVE-2003-1332 https://bugzilla.redhat.com/show_bug.cgi?id=1933060 •

CVSS: 10.0EPSS: 4%CPEs: 77EXPL: 0

Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201. Múltiples desbordamientos de búfer en Samba anteriores a 2.2.8a puede permitir a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio, descubierto por el equipo de Samba y una vulnerabilidad distinta de CAN-2003-0201. • http://marc.info/?l=bugtraq&m=104973186901597&w=2 http://marc.info/?l=bugtraq&m=104974612519064&w=2 http://www.debian.org/security/2003/dsa-280 http://www.mandriva.com/security/advisories?name=MDKSA-2003:044 http://www.redhat.com/support/errata/RHSA-2003-137.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A564 https://access.redhat.com/security/cve/CVE-2003-0196 https://bugzilla.redhat.com/show_bug.cgi?id=1617001 •

CVSS: 10.0EPSS: 97%CPEs: 81EXPL: 14

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función call_trans2open en trans2.c de Samba 2.2.x anteriores a 2.2.8a, 2.0.10 y versiones anteriores 2.0.x, y Samba-TNG anteriores a de 0.3.2, permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/16880 https://www.exploit-db.com/exploits/55 https://www.exploit-db.com/exploits/7 https://www.exploit-db.com/exploits/16861 https://www.exploit-db.com/exploits/10 https://www.exploit-db.com/exploits/16876 https://www.exploit-db.com/exploits/9924 https://www.exploit-db.com/exploits/16330 https://www.exploit-db.com/exploits/22469 https://www.exploit-db.com/exploits/22471 https://www.exploit-db.com/exploits/22470 https: •

CVSS: 10.0EPSS: 96%CPEs: 29EXPL: 3

Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/9936 https://www.exploit-db.com/exploits/16321 https://www.exploit-db.com/exploits/22356 ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I http://marc.info/?l=bugtraq&m=104792646416629&w=2 http://marc.info/?l=bugtraq&m=104792723017768&w=2 http://marc.info/?l=bugtraq&m=104801012929374&w=2 http://secunia.com/advisories/8299 http://secunia.com/advisories/8303 http://www.debian.org/security/2003/dsa-262 h •

CVSS: 1.2EPSS: 0%CPEs: 22EXPL: 0

The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. • ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I http://marc.info/?l=bugtraq&m=104792646416629&w=2 http://marc.info/?l=bugtraq&m=104801012929374&w=2 http://secunia.com/advisories/8299 http://secunia.com/advisories/8303 http://www.debian.org/security/2003/dsa-262 http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:032 http://www.novell.com/linux/security/advisories/2003_016_samba •