Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.704271
Categoría:Debian Local Security Checks
Título:Debian Security Advisory DSA 4271-1 (samba - security update)
Resumen:Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,;print, and login server for Unix. The Common Vulnerabilities and;Exposures project identifies the following issues:;;CVE-2018-10858;Svyatoslav Phirsov discovered that insufficient input validation in;libsmbclient allowed a malicious Samba server to write to the;client's heap memory.;;CVE-2018-10919;Phillip Kuhrt discovered that Samba when acting as an Active Domain;controller disclosed some sensitive attributes.
Descripción:Summary:
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-10858
Svyatoslav Phirsov discovered that insufficient input validation in
libsmbclient allowed a malicious Samba server to write to the
client's heap memory.

CVE-2018-10919
Phillip Kuhrt discovered that Samba when acting as an Active Domain
controller disclosed some sensitive attributes.

Affected Software/OS:
samba on Debian Linux

Solution:
For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u3.

We recommend that you upgrade your samba packages.

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-10858
Common Vulnerability Exposure (CVE) ID: CVE-2018-10919
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.