similar to: [SECURITY] CAN-2004-0882: Possible Buffer Overrun in smbd

Displaying 20 results from an estimated 1000 matches similar to: "[SECURITY] CAN-2004-0882: Possible Buffer Overrun in smbd"

2004 Dec 16
1
CAN-2004-1154 : Integer overflow could lead to remote code execution in Samba 2.x, 3.0.x <= 3.0.9
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Possible remote code execution == CVE ID#: CAN-2004-1154 == == Versions: Samba 2.x & 3.0.x <= 3.0.9 == == Summary: A potential integer overflow when == unmarshalling specific MS-RPC requests == from clients could lead to heap == corruption and remote code execution.
2004 Nov 08
0
[SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability in Samba 3.0.x <= 3.0.7
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Potential Remote Denial of Service CVE #: CAN-2004-0930 Affected Versions: Samba 3.0.x <= 3.0.7 Summary: A remote attacker could cause and smbd process to consume abnormal amounts of system resources due to an input validation error when matching filenames containing wildcard characters. Patch Availability - ------------------ A
2004 Dec 16
0
CAN-2004-1154 : Integer overflow could lead to remote code execution in Samba 2.x, 3.0.x <= 3.0.9
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Possible remote code execution == CVE ID#: CAN-2004-1154 == == Versions: Samba 2.x & 3.0.x <= 3.0.9 == == Summary: A potential integer overflow when == unmarshalling specific MS-RPC requests == from clients could lead to heap == corruption and remote code execution.
2004 Sep 13
0
Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Samba 3.0.x Denial of Service Flaw Summary: (i) A DoS bug in smbd may allow an unauthenticated user to cause smbd to spawn new processes each one entering an infinite loop. After sending a sufficient amount of packets it is possible to exhaust the memory resources on the server. (ii) A DoS bug in nmbd may allow an attacker to
2004 Sep 13
0
Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Samba 3.0.x Denial of Service Flaw Summary: (i) A DoS bug in smbd may allow an unauthenticated user to cause smbd to spawn new processes each one entering an infinite loop. After sending a sufficient amount of packets it is possible to exhaust the memory resources on the server. (ii) A DoS bug in nmbd may allow an attacker to
2004 Oct 05
0
ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ERRATA - ------ The original announcement for the Samba vulnerability identified by CAN-2004-0815 reported that Samba versions 3.0.0 - 3.0.5 inclusive were subject the remote file access bug. Later research has confirmed that *only* Samba 3.0.x <= 3.0.2a contains the exploitable code. The Samba Team expresses sincere apologies for any confusion
2004 Oct 05
0
ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ERRATA - ------ The original announcement for the Samba vulnerability identified by CAN-2004-0815 reported that Samba versions 3.0.0 - 3.0.5 inclusive were subject the remote file access bug. Later research has confirmed that *only* Samba 3.0.x <= 3.0.2a contains the exploitable code. The Samba Team expresses sincere apologies for any confusion
2004 Dec 21
1
zaptel ppp HDLC Receiver Overrun messages
I have a pair of sites tied together with a T1 line running zaptel PPP on either end. The system works, but I keep getting these messages in the kernel logs, and users are reporting connection problems (TCP timeouts, and hangs) especially under high usage. --snip-- HDLC Receiver overrun on channel WCT1/0/1 (master=WCT1/0/1) HDLC Receiver overrun on channel WCT1/0/1 (master=WCT1/0/1) HDLC
2002 Nov 20
0
error: prs_mem_get: reading data of size 60 would overrun buffer.
Hello everyone, we try to use a server running linux in an NT-domain and get the error message given in the subject-line. More details from the logfile and smb.conf are given below. Can anyone give us a hint what the problem is? (Of course...) The problem is very urgent for us. Thanks a lot in advance. Helmut Rickel ================= smb.conf ======================== [global]
2005 May 17
0
data overrun on SCSI drive
I have a system that I just installed with CentOS 4.0. It is an HP NetServer E 60 with dual CPUs and 1G RAM. There is an Adaptec AIC-7895 built into the motherboard. On bootup, I get this: (scsi0:A:1): 11.626MB/s transfers (5.813MHz, offset 8, 16bit) (scsi0:A:1:0): data overrun detected in Data-in phase. Tag == 0x2. (scsi0:A:1:0): Have seen Data Phase. Length = 255. NumSGs = 1. sg[0] - Addr
2001 Mar 21
0
[RHSA-2001:018-02] Updated sudo packages fixing buffer overrun available
--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated sudo packages fixing buffer overrun available Advisory ID: RHSA-2001:018-02 Issue date: 2001-02-23 Updated on: 2001-03-02 Product: Red Hat Linux Keywords: sudo buffer overrun Cross references:
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Buffer overrun in NSS host lookup Winbind == library on Solaris == CVE ID#: CVE-2007-0453 == == Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on == Sun Solaris == == Summary: A potential overrun in the gethostbyname() == and getipnodebyname() in the
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Buffer overrun in NSS host lookup Winbind == library on Solaris == CVE ID#: CVE-2007-0453 == == Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on == Sun Solaris == == Summary: A potential overrun in the gethostbyname() == and getipnodebyname() in the
2005 Aug 17
1
overrun buffer
Hi all I am getting this error, when running the command below from my workstation: `--> sudo net rpc info -S SMBPDC [2005/08/17 14:33:16, 0] rpc_parse/parse_prs.c:prs_mem_get(537) prs_mem_get: reading data of size 14287078 would overrun buffer. However, if I run the same command from the PDC itself, then it's ok: . ldapsmb-pdc:~# net rpc info Domain Name: ILR Domain SID:
2010 Apr 28
1
[LLVMdev] [Patch] Bufer overrun in getValueTypeList()
Hello, The attached patch is to add an assert to getValueTypeList() to verify that for simple value types their value is NOT between MAX_ALLOWED_VALUETYPE and LastSimpleValueType (inclusive) as this causes a buffer overrun. Thanks, Javier -----Original Message----- From: Duncan Sands [mailto:baldrick at free.fr] Sent: Tuesday, April 27, 2010 5:07 AM To: Martinez, Javier E Cc: LLVM Developers
2017 May 19
0
AST-2017-002: Buffer Overrun in PJSIP transaction layer
Asterisk Project Security Advisory - AST-2017-002 Product Asterisk Summary Buffer Overrun in PJSIP transaction layer Nature of Advisory Buffer Overrun/Crash Susceptibility Remote Unauthenticated Sessions Severity Critical
2001 Mar 21
0
[RHSA-2001:019-02] Updated sudo packages fixing buffer overrun available
--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated sudo packages fixing buffer overrun available Advisory ID: RHSA-2001:019-02 Issue date: 2001-02-23 Updated on: 2001-03-21 Product: Red Hat Powertools Keywords: sudo buffer overrun Cross references:
2003 Aug 17
2
no incoming packets & Sound: Recording overrun
On Sun, Aug 17, 2003 at 03:44:21AM -0500, Gnophone Support wrote: > Hello, and thank you for registering at gnophone.com. Your login > information is listed below: > > Username: miernik > Password: ******* > IAX Phone Number: 17002916107 > > Please login as soon as possible to > http://x.linux-support.net/directory/ to complete the
2015 Jun 25
3
[PATCH] Fix buffer overrun
When a forwarding specification ending in a slash ('\\') is used, the function "parse_fwd_field" jumps over the '\0' char marking the end of the string and keeps processing. This patch checks for that condition. -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-Fix-buffer-overrun.patch Type: application/text Size: 850 bytes Desc:
2004 Aug 06
2
Sound:Recording Overrun
Has anybody had this problem? I came in this morning and found my streamer down and this message flashing by on the console. "Sound: Recording Overrun" I'm running Icecast 1.3.11 and the source is Liveice on Redhat 7.1 if that makes a difference. <p>Just curious, Matt <p>--- >8 ---- List archives: http://www.xiph.org/archives/ icecast project homepage: