FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-12-12 06:08:27 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68
These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
a63b15f9-97ff-11dc-9e48-0016179b2dd5 | samba -- multiple vulnerabilities
The Samba Team reports:
Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd. This defect may
only be exploited when the "wins support" parameter has
been enabled in smb.conf.
Samba developers have discovered what is believed to be
a non-exploitable buffer over in nmbd during the processing
of GETDC logon server requests. This code is only used
when the Samba server is configured as a Primary or Backup
Domain Controller.
Discovery 2007-11-15 Entry 2007-11-21 Modified 2008-09-26 samba
samba3
ja-samba
< 3.0.26a
> *,1 lt 3.0.26a_2,1
26454
CVE-2007-4572
CVE-2007-5398
http://secunia.com/advisories/27450/
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://us1.samba.org/samba/security/CVE-2007-5398.html
|
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72 | samba -- buffer overflow vulnerability
Secuna Research reports:
Secunia Research has discovered a vulnerability in Samba, which
can be exploited by malicious people to compromise a vulnerable
system. The vulnerability is caused due to a boundary error within
the "send_mailslot()" function. This can be exploited to cause a
stack-based buffer overflow with zero bytes via a specially crafted
"SAMLOGON" domain logon packet containing a username string placed
at an odd offset followed by an overly long GETDC string.
Successful exploitation allows execution of arbitrary code, but
requires that the "domain logons" option is enabled.
Discovery 2007-12-10 Entry 2007-12-12 Modified 2008-09-26 samba
samba3
ja-samba
< 3.0.28
> *,1 lt 3.0.28,1
CVE-2007-6015
http://secunia.com/advisories/27760/
|