Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-2446

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-14 May, 2007 | 21:00
Updated At-07 Aug, 2024 | 13:42
Rejected At-
Credits

Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:14 May, 2007 | 21:00
Updated At:07 Aug, 2024 | 13:42
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.gentoo.org/glsa/glsa-200705-15.xml
vendor-advisory
x_refsource_GENTOO
http://www.securityfocus.com/archive/1/468672/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/25289
third-party-advisory
x_refsource_SECUNIA
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
mailing-list
x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/468673/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/468674/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.samba.org/samba/security/CVE-2007-2446.html
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
vdb-entry
x_refsource_XF
http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/2732
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/1805
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/3229
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/25772
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
vendor-advisory
x_refsource_HP
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
vendor-advisory
x_refsource_OPENPKG
http://secunia.com/advisories/25257
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25391/
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/24198
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/468675/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/25270
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/468670/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
vendor-advisory
x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2007/2281
vdb-entry
x_refsource_VUPEN
http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
x_refsource_MISC
http://www.vupen.com/english/advisories/2007/2210
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
vendor-advisory
x_refsource_HP
https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
vdb-entry
x_refsource_XF
http://www.trustix.org/errata/2007/0017/
vendor-advisory
x_refsource_TRUSTIX
http://www.ubuntu.com/usn/usn-460-1
vendor-advisory
x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
vdb-entry
x_refsource_XF
http://securityreason.com/securityalert/2702
third-party-advisory
x_refsource_SREASON
http://secunia.com/advisories/25567
third-party-advisory
x_refsource_SECUNIA
http://osvdb.org/34731
vdb-entry
x_refsource_OSVDB
http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
x_refsource_MISC
http://osvdb.org/34699
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/25241
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28292
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/25256
third-party-advisory
x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1366
x_refsource_CONFIRM
http://secunia.com/advisories/25259
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
vdb-entry
x_refsource_XF
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
vendor-advisory
x_refsource_SLACKWARE
http://www.osvdb.org/34732
vdb-entry
x_refsource_OSVDB
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
vendor-advisory
x_refsource_SUNALERT
http://www.securityfocus.com/archive/1/468542/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1018050
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/23973
vdb-entry
x_refsource_BID
http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
x_refsource_MISC
http://secunia.com/advisories/26909
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2008/0050
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/27706
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1291
vendor-advisory
x_refsource_DEBIAN
http://www.kb.cert.org/vuls/id/773720
third-party-advisory
x_refsource_CERT-VN
http://docs.info.apple.com/article.html?artnum=306172
x_refsource_CONFIRM
http://secunia.com/advisories/25232
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25251
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/25246
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/468680/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/24197
vdb-entry
x_refsource_BID
http://osvdb.org/34733
vdb-entry
x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
vdb-entry
signature
x_refsource_OVAL
http://www.securityfocus.com/bid/25159
vdb-entry
x_refsource_BID
http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
x_refsource_MISC
http://secunia.com/advisories/25255
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/24196
vdb-entry
x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2007-0354.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/bid/24195
vdb-entry
x_refsource_BID
http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
x_refsource_MISC
http://secunia.com/advisories/26235
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25675
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2079
vdb-entry
x_refsource_VUPEN
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securityfocus.com/archive/1/468672/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/25289
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.securityfocus.com/archive/1/468673/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securityfocus.com/archive/1/468674/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.samba.org/samba/security/CVE-2007-2446.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/2732
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/1805
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/3229
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/25772
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://secunia.com/advisories/25257
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25391/
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/24198
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/468675/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/25270
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/468670/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2007/2281
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2007/2210
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.trustix.org/errata/2007/0017/
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.ubuntu.com/usn/usn-460-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://securityreason.com/securityalert/2702
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://secunia.com/advisories/25567
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://osvdb.org/34731
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
Resource:
x_refsource_MISC
Hyperlink: http://osvdb.org/34699
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/25241
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28292
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/25256
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://issues.rpath.com/browse/RPL-1366
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25259
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.osvdb.org/34732
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.securityfocus.com/archive/1/468542/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securitytracker.com/id?1018050
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/23973
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/26909
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2008/0050
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/27706
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2007/dsa-1291
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.kb.cert.org/vuls/id/773720
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://docs.info.apple.com/article.html?artnum=306172
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25232
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25251
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/25246
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/468680/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securityfocus.com/bid/24197
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://osvdb.org/34733
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securityfocus.com/bid/25159
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/25255
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/24196
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0354.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/bid/24195
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/26235
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25675
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2079
Resource:
vdb-entry
x_refsource_VUPEN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.gentoo.org/glsa/glsa-200705-15.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securityfocus.com/archive/1/468672/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/25289
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.securityfocus.com/archive/1/468673/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securityfocus.com/archive/1/468674/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.samba.org/samba/security/CVE-2007-2446.html
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
vdb-entry
x_refsource_XF
x_transferred
http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/2732
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/1805
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/3229
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/25772
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
vendor-advisory
x_refsource_HP
x_transferred
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://secunia.com/advisories/25257
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25391/
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/24198
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/468675/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/25270
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/468670/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2007/2281
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2007/2210
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
vendor-advisory
x_refsource_HP
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
vdb-entry
x_refsource_XF
x_transferred
http://www.trustix.org/errata/2007/0017/
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.ubuntu.com/usn/usn-460-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
vdb-entry
x_refsource_XF
x_transferred
http://securityreason.com/securityalert/2702
third-party-advisory
x_refsource_SREASON
x_transferred
http://secunia.com/advisories/25567
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://osvdb.org/34731
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
x_refsource_MISC
x_transferred
http://osvdb.org/34699
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/25241
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28292
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/25256
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://issues.rpath.com/browse/RPL-1366
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25259
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
vdb-entry
x_refsource_XF
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.osvdb.org/34732
vdb-entry
x_refsource_OSVDB
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.securityfocus.com/archive/1/468542/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securitytracker.com/id?1018050
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/23973
vdb-entry
x_refsource_BID
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/26909
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2008/0050
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/27706
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2007/dsa-1291
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.kb.cert.org/vuls/id/773720
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://docs.info.apple.com/article.html?artnum=306172
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25232
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25251
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/25246
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/468680/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securityfocus.com/bid/24197
vdb-entry
x_refsource_BID
x_transferred
http://osvdb.org/34733
vdb-entry
x_refsource_OSVDB
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securityfocus.com/bid/25159
vdb-entry
x_refsource_BID
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/25255
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/24196
vdb-entry
x_refsource_BID
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0354.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/bid/24195
vdb-entry
x_refsource_BID
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/26235
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25675
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2079
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468672/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/25289
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468673/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468674/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.samba.org/samba/security/CVE-2007-2446.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2732
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1805
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3229
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/25772
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://secunia.com/advisories/25257
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25391/
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24198
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468675/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/25270
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468670/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2281
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2210
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.trustix.org/errata/2007/0017/
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-460-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://securityreason.com/securityalert/2702
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://secunia.com/advisories/25567
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://osvdb.org/34731
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://osvdb.org/34699
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/25241
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28292
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/25256
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-1366
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25259
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.osvdb.org/34732
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468542/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018050
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/23973
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/26909
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0050
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/27706
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2007/dsa-1291
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/773720
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=306172
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25232
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25251
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/25246
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/468680/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24197
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://osvdb.org/34733
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securityfocus.com/bid/25159
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/25255
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24196
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0354.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24195
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/26235
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25675
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2079
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:14 May, 2007 | 21:19
Updated At:16 Oct, 2018 | 16:43

Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Samba
samba
>>samba>>3.0.0
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.1
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.2
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.2a
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.10
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.11
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.12
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.13
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.14
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.14a
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.15
cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.16
cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.17
cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.18
cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.19
cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20a
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20b
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21a
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21b
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21c
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.22
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23
cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23a
cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23b
cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23c
cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23d
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.24
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://docs.info.apple.com/article.html?artnum=306172secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlsecalert@redhat.com
N/A
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.htmlsecalert@redhat.com
N/A
http://lists.suse.com/archive/suse-security-announce/2007-May/0006.htmlsecalert@redhat.com
N/A
http://osvdb.org/34699secalert@redhat.com
N/A
http://osvdb.org/34731secalert@redhat.com
N/A
http://osvdb.org/34733secalert@redhat.com
N/A
http://secunia.com/advisories/25232secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25241secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25246secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25251secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25255secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25256secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25257secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25259secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25270secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25289secalert@redhat.com
N/A
http://secunia.com/advisories/25391/secalert@redhat.com
N/A
http://secunia.com/advisories/25567secalert@redhat.com
N/A
http://secunia.com/advisories/25675secalert@redhat.com
N/A
http://secunia.com/advisories/25772secalert@redhat.com
N/A
http://secunia.com/advisories/26235secalert@redhat.com
N/A
http://secunia.com/advisories/26909secalert@redhat.com
N/A
http://secunia.com/advisories/27706secalert@redhat.com
N/A
http://secunia.com/advisories/28292secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200705-15.xmlsecalert@redhat.com
N/A
http://securityreason.com/securityalert/2702secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1secalert@redhat.com
N/A
http://www.debian.org/security/2007/dsa-1291secalert@redhat.com
N/A
http://www.kb.cert.org/vuls/id/773720secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:104secalert@redhat.com
N/A
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/34732secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-0354.htmlsecalert@redhat.com
Vendor Advisory
http://www.samba.org/samba/security/CVE-2007-2446.htmlsecalert@redhat.com
Patch
Vendor Advisory
http://www.securityfocus.com/archive/1/468542/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468670/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468672/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468673/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468674/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468675/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/468680/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/23973secalert@redhat.com
N/A
http://www.securityfocus.com/bid/24195secalert@redhat.com
N/A
http://www.securityfocus.com/bid/24196secalert@redhat.com
N/A
http://www.securityfocus.com/bid/24197secalert@redhat.com
N/A
http://www.securityfocus.com/bid/24198secalert@redhat.com
N/A
http://www.securityfocus.com/bid/25159secalert@redhat.com
N/A
http://www.securitytracker.com/id?1018050secalert@redhat.com
N/A
http://www.trustix.org/errata/2007/0017/secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-460-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1805secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2079secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2210secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2281secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2732secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/3229secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/0050secalert@redhat.com
N/A
http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdfsecalert@redhat.com
N/A
http://www.zerodayinitiative.com/advisories/ZDI-07-029.htmlsecalert@redhat.com
N/A
http://www.zerodayinitiative.com/advisories/ZDI-07-030.htmlsecalert@redhat.com
N/A
http://www.zerodayinitiative.com/advisories/ZDI-07-031.htmlsecalert@redhat.com
N/A
http://www.zerodayinitiative.com/advisories/ZDI-07-032.htmlsecalert@redhat.com
N/A
http://www.zerodayinitiative.com/advisories/ZDI-07-033.htmlsecalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34309secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34311secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34312secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34314secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34316secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-1366secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415secalert@redhat.com
N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=306172
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://osvdb.org/34699
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://osvdb.org/34731
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://osvdb.org/34733
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25232
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25241
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25246
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25251
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25255
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25256
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25257
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25259
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25270
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25289
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25391/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25567
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25675
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25772
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/26235
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/26909
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27706
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28292
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-15.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/2702
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2007/dsa-1291
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/773720
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/34732
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0354.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.samba.org/samba/security/CVE-2007-2446.html
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/468542/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468670/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468672/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468673/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468674/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468675/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/468680/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/23973
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24195
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24196
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24197
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24198
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/25159
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1018050
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2007/0017/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-460-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1805
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2079
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2210
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2281
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2732
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/3229
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0050
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-1366
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1661Records found

CVE-2017-7494
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-94.24% / 99.92%
||
7 Day CHG~0.00%
Published-30 May, 2017 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-04-20||Apply updates per vendor instructions.

Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.

Action-Not Available
Vendor-SambaDebian GNU/Linux
Product-sambadebian_linuxsambaSamba
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2012-1182
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-10||HIGH
EPSS-76.40% / 98.89%
||
7 Day CHG~0.00%
Published-10 Apr, 2012 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CVE-2004-0882
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-33.01% / 96.74%
||
7 Day CHG~0.00%
Published-19 Nov, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.

Action-Not Available
Vendor-conectivan/aRed Hat, Inc.UbuntuSamba
Product-ubuntu_linuxsambaenterprise_linux_desktopfedora_corelinuxenterprise_linuxlinux_advanced_workstationn/a
CVE-2004-1154
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-27.77% / 96.27%
||
7 Day CHG~0.00%
Published-22 Dec, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.

Action-Not Available
Vendor-trustixn/aRed Hat, Inc.SambaSUSE
Product-sambafedora_coresecure_linuxsuse_linuxn/a
CVE-2003-0201
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-80.77% / 99.11%
||
7 Day CHG~0.00%
Published-15 Apr, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.

Action-Not Available
Vendor-samba-tngcompaqn/aApple Inc.SambaSun Microsystems (Oracle Corporation)HP Inc.
Product-tru64hp-uxsolarissamba-tngsambasunoscifs-9000_servermac_os_xn/a
CVE-2003-0085
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-86.07% / 99.35%
||
7 Day CHG~0.00%
Published-18 Mar, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.

Action-Not Available
Vendor-n/aSambaHP Inc.
Product-sambacifs-9000_servern/a
CVE-2003-0196
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-6.78% / 90.93%
||
7 Day CHG~0.00%
Published-15 Apr, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.

Action-Not Available
Vendor-samba-tngcompaqn/aSambaSun Microsystems (Oracle Corporation)HP Inc.
Product-tru64hp-uxsolarissamba-tngsambasunoscifs-9000_servern/a
CVE-2002-1318
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-73.41% / 98.75%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.

Action-Not Available
Vendor-n/aSambaSilicon Graphics, Inc.HP Inc.
Product-sambacifs-9000_serveririxn/a
CVE-2001-1162
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-30.17% / 96.51%
||
7 Day CHG~0.00%
Published-25 Jun, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.

Action-Not Available
Vendor-n/aSambaHP Inc.
Product-sambacifs-9000_servern/a
CVE-1999-0810
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.47% / 63.77%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service in Samba NETBIOS name service daemon (nmbd).

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CVE-1999-0182
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.02% / 86.08%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CVE-2004-0600
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-59.61% / 98.17%
||
7 Day CHG~0.00%
Published-23 Jul, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.

Action-Not Available
Vendor-trustixn/aSamba
Product-sambasecure_linuxn/a
CVE-2015-0240
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-10||HIGH
EPSS-92.17% / 99.70%
||
7 Day CHG~0.00%
Published-24 Feb, 2015 | 01:00
Updated-09 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.SambaNovell
Product-suse_linux_enterprise_software_development_kitubuntu_linuxsuse_linux_enterprise_desktopsuse_linux_enterprise_serversambaenterprise_linuxn/a
CVE-2013-4408
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.3||HIGH
EPSS-2.65% / 85.18%
||
7 Day CHG~0.00%
Published-10 Dec, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-0870
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.9||HIGH
EPSS-48.90% / 97.69%
||
7 Day CHG~0.00%
Published-23 Feb, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.

Action-Not Available
Vendor-rimn/aSamba
Product-blackberry_playbook_tabletblackberry_playbook_ossamban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0719
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-18.03% / 94.91%
||
7 Day CHG~0.00%
Published-01 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1097
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-2.43% / 84.54%
||
7 Day CHG~0.00%
Published-30 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.

Action-Not Available
Vendor-n/aSamba
Product-rsyncn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2002-2196
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-13.07% / 93.83%
||
7 Day CHG~0.00%
Published-16 Nov, 2005 | 21:17
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-3069
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-39.49% / 97.19%
||
7 Day CHG~0.00%
Published-15 Sep, 2010 | 17:26
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

Action-Not Available
Vendor-n/aCanonical Ltd.Samba
Product-ubuntu_linuxsamban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-2063
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-80.17% / 99.08%
||
7 Day CHG~0.00%
Published-17 Jun, 2010 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxSamba
Product-ubuntu_linuxsambadebian_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-1642
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-5.05% / 89.36%
||
7 Day CHG~0.00%
Published-17 Jun, 2010 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-1720
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-8.44% / 91.97%
||
7 Day CHG~0.00%
Published-10 Apr, 2008 | 19:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aSamba
Product-rsyncn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-6015
Matching Score-6
Assigner-Flexera Software LLC
ShareView Details
Matching Score-6
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-43.92% / 97.45%
||
7 Day CHG~0.00%
Published-13 Dec, 2007 | 21:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-4603
Matching Score-6
Assigner-VulDB
ShareView Details
Matching Score-6
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 13.74%
||
7 Day CHG~0.00%
Published-18 Dec, 2022 | 00:00
Updated-03 Aug, 2024 | 01:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ppp pppdump pppdump.c dumpppp array index

A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario.

Action-Not Available
Vendor-unspecifiedSamba
Product-pppppp
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2123
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-1.47% / 80.12%
||
7 Day CHG~0.00%
Published-01 Nov, 2018 | 13:00
Updated-05 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.

Action-Not Available
Vendor-[UNKNOWN]Samba
Product-sambasamba
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-10858
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-7.05% / 91.12%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 17:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxSambaRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxvirtualizationdebian_linuxsambaenterprise_linux_workstationvirtualization_hostenterprise_linux_desktopsamba
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-0771
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-5.66% / 90.01%
||
7 Day CHG~0.00%
Published-13 Mar, 2016 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-3493
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-2.7||LOW
EPSS-2.25% / 83.91%
||
7 Day CHG~0.00%
Published-23 Jun, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-1105
Matching Score-6
Assigner-Flexera Software LLC
ShareView Details
Matching Score-6
Assigner-Flexera Software LLC
CVSS Score-7.5||HIGH
EPSS-90.44% / 99.59%
||
7 Day CHG~0.00%
Published-29 May, 2008 | 16:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxSamba
Product-ubuntu_linuxdebian_linuxsamban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-5398
Matching Score-6
Assigner-Flexera Software LLC
ShareView Details
Matching Score-6
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-40.72% / 97.27%
||
7 Day CHG~0.00%
Published-16 Nov, 2007 | 18:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-4572
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-27.40% / 96.23%
||
7 Day CHG~0.00%
Published-16 Nov, 2007 | 18:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

Action-Not Available
Vendor-n/aSamba
Product-samban/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-15275
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-43.47% / 97.42%
||
7 Day CHG~0.00%
Published-27 Nov, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Red Hat, Inc.Samba
Product-enterprise_linux_desktopenterprise_linux_workstationsambadebian_linuxenterprise_linux_serverubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-2450
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-10||HIGH
EPSS-3.04% / 86.13%
||
7 Day CHG~0.00%
Published-11 Nov, 2011 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

Action-Not Available
Vendor-n/aMicrosoft CorporationLinux Kernel Organization, IncGoogle LLCSun Microsystems (Oracle Corporation)Apple Inc.Adobe Inc.
Product-linux_kernelwindowssolarisandroidflash_playeradobe_airmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-0061
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-14.67% / 94.22%
||
7 Day CHG~0.00%
Published-21 Sep, 2007 | 18:00
Updated-07 Aug, 2024 | 12:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory."

Action-Not Available
Vendor-n/aCanonical Ltd.VMware (Broadcom Inc.)
Product-workstationesxubuntu_linuxaceserverplayern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-8658
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.8||CRITICAL
EPSS-36.01% / 96.97%
||
7 Day CHG~0.00%
Published-11 Aug, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability exists in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".

Action-Not Available
Vendor-Microsoft Corporation
Product-chakracoreChakraCore
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-5333
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-10||HIGH
EPSS-8.29% / 91.90%
||
7 Day CHG~0.00%
Published-11 Dec, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-shockwave_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-5329
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-10||HIGH
EPSS-11.53% / 93.35%
||
7 Day CHG~0.00%
Published-13 Nov, 2013 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK & Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5330.

Action-Not Available
Vendor-n/aAdobe Inc.Linux Kernel Organization, IncApple Inc.Microsoft Corporation
Product-airflash_playerlinux_kernelair_sdkwindowsmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-0074
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-29.46% / 96.44%
||
7 Day CHG~0.00%
Published-17 Nov, 2008 | 23:00
Updated-07 Aug, 2024 | 12:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.

Action-Not Available
Vendor-n/aTrend Micro Incorporated
Product-serverprotectn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-8410
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.92% / 85.84%
||
7 Day CHG~0.00%
Published-02 Jul, 2019 | 19:46
Updated-05 Aug, 2024 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary performs a memcpy operation at address 0x00011E34 with the value sent in the "Authorization: Basic" RTSP header and stores it on the stack. The number of bytes to be copied are calculated based on the length of the string sent in the RTSP header by the client. As a result, memcpy copies more data then it can hold on stack and this results in corrupting the registers for the caller function sub_F6CC which results in memory corruption. The severity of this attack is enlarged by the fact that the same value is then copied on the stack in the function 0x00011378 and this allows to overflow the buffer allocated and thus control the PC register which will result in arbitrary code execution on the device.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dcs-1100dcs-1130dcs-1100_firmwaredcs-1130_firmwaren/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-0073
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-29.46% / 96.44%
||
7 Day CHG~0.00%
Published-17 Nov, 2008 | 23:00
Updated-07 Aug, 2024 | 12:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.

Action-Not Available
Vendor-n/aTrend Micro Incorporated
Product-serverprotectn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7827
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.65% / 85.18%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxFirefox
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1851
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-29.84% / 96.47%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long mode field.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1731
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-38.90% / 97.16%
||
7 Day CHG~0.00%
Published-07 May, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed EXEC_INTEGUTIL message.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_storage_data_protectorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-7810
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.51% / 84.79%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxthunderbirdenterprise_linux_server_eusfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_desktopFirefoxFirefox ESRThunderbird
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-5324
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-10||HIGH
EPSS-11.53% / 93.35%
||
7 Day CHG~0.00%
Published-11 Sep, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363.

Action-Not Available
Vendor-n/aAdobe Inc.Linux Kernel Organization, IncGoogle LLCApple Inc.Microsoft Corporation
Product-airflash_playerlinux_kernelair_sdkwindowsmac_os_xandroidn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-8248
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.38% / 84.35%
||
7 Day CHG~0.00%
Published-16 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow may occur in the processing of a downlink NAS message in Qualcomm Telephony as used in Apple iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation.

Action-Not Available
Vendor-Apple Inc.Qualcomm Technologies, Inc.
Product-iphone_osTelephony
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-0062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-5.40% / 89.74%
||
7 Day CHG~0.00%
Published-21 Sep, 2007 | 18:00
Updated-07 Aug, 2024 | 12:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstationvmware_workstationaceserverplayern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-189
Not Available
CVE-2007-0460
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.53% / 66.25%
||
7 Day CHG~0.00%
Published-24 Jan, 2007 | 01:00
Updated-07 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations."

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-4642
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-29.10% / 96.40%
||
7 Day CHG~0.00%
Published-31 Aug, 2007 | 23:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allow remote attackers to execute arbitrary code via a long chat (PKT_CHAT) message that is not properly handled by the (1) D_NetPlayerEvent function in d_net.c or the (2) Msg_Write function in net_msg.c, or (3) many commands that are not properly handled by the NetSv_ReadCommands function in d_netsv.c; or (4) cause a denial of service (daemon crash) via a chat (PKT_CHAT) message without a final '\0' character.

Action-Not Available
Vendor-doomsdayn/a
Product-doomsdayn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-8020
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-8.59% / 92.04%
||
7 Day CHG~0.00%
Published-28 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-scaleioEMC ScaleIO EMC ScaleIO 2.0.1.x version family (2.0.1.3, 2.0.1.2, 2.0.1.1, 2.0.1)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 33
  • 34
  • Next
Details not found