Download
| Alert*
oval:org.secpod.oval:def:202244
Samba is a suite of programs used by machines to share files, printers, and other information. An input validation flaw was found in the way Samba handled Any Batched requests. A remote, unauthenticated attacker could send a specially-crafted SMB packet to the Samba server, possibly resulting in ar ... oval:org.secpod.oval:def:700780 samba: SMB/CIFS file, print, and login server for Unix Samba could be made to crash or run programs if it received specially crafted network traffic. oval:org.secpod.oval:def:400369 - Add the ldapsmb sources as else patches against them have no chance to apply. - Samba pre-3.6.4 are affected by a vulnerability that allows remote code exe- cution as the "root" user; PIDL based autogenerated code allows overwriting beyond of allocated array; CVE-2012-1182; ; . - s3-winb ... oval:org.secpod.oval:def:1300022 A vulnerability has been found and corrected in samba: Heap-based buffer overflow in process.c in smbd in Samba allows remote attackers to cause a denial of service or possibly execute arbitrary code via a Batched request that triggers infinite recursion . The updated packages have been patched to ... oval:org.secpod.oval:def:500721 Samba is a suite of programs used by machines to share files, printers, and other information. An input validation flaw was found in the way Samba handled Any Batched requests. A remote, unauthenticated attacker could send a specially-crafted SMB packet to the Samba server, possibly resulting in ar ... oval:org.secpod.oval:def:5816 The host is installed with Apple Mac OS X 10.6.8 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a Batched (aka AndX) request that triggers infinite recursion. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:5820 The host is missing an important security update according to Apple advisory, APPLE-SA-2012-05-09-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute ... |