CVE-2010-3069

Loading...

General

Score:7.5/10.0
Severity:High
Category:Buffer Error

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2006-7243, CVE-2007-2444, CVE-2007-2446, CVE-2007-2447, CVE-2008-1105, CVE-2008-3789, CVE-2008-4314, CVE-2009-0590, CVE-2009-2409, CVE-2009-2813, CVE-2009-2906, CVE-2009-2948, CVE-2009-3245, CVE-2009-3297, CVE-2009-3555, CVE-2010-0405, CVE-2010-0547, CVE-2010-0728, CVE-2010-0740, CVE-2010-0787, CVE-2010-0926, CVE-2010-1323, CVE-2010-1324, CVE-2010-1452, CVE-2010-1642, CVE-2010-2063, CVE-2010-2068, CVE-2010-2632, CVE-2010-2950, CVE-2010-3089, CVE-2010-3315, CVE-2010-3434, CVE-2010-3436, CVE-2010-3677, CVE-2010-3682, CVE-2010-3709, CVE-2010-3710, CVE-2010-3790, CVE-2010-3801, CVE-2010-3802, CVE-2010-3814, CVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3855, CVE-2010-3864, CVE-2010-3870, CVE-2010-4008, CVE-2010-4009, CVE-2010-4020, CVE-2010-4021, CVE-2010-4150, CVE-2010-4180, CVE-2010-4260, CVE-2010-4261, CVE-2010-4409, CVE-2010-4479, CVE-2010-4494, CVE-2010-4651, CVE-2011-0014, CVE-2011-0170, CVE-2011-0172, CVE-2011-0173, CVE-2011-0174, CVE-2011-0175, CVE-2011-0176, CVE-2011-0177, CVE-2011-0178, CVE-2011-0179, CVE-2011-0180, CVE-2011-0181, CVE-2011-0182, CVE-2011-0183, CVE-2011-0184, CVE-2011-0186, CVE-2011-0187, CVE-2011-0188, CVE-2011-0189, CVE-2011-0190, CVE-2011-0191, CVE-2011-0192, CVE-2011-0193, CVE-2011-0194, CVE-2011-0195, CVE-2011-0196, CVE-2011-0197, CVE-2011-0198, CVE-2011-0199, CVE-2011-0200, CVE-2011-0201, CVE-2011-0202, CVE-2011-0203, CVE-2011-0204, CVE-2011-0205, CVE-2011-0206, CVE-2011-0207, CVE-2011-0208, CVE-2011-0209, CVE-2011-0210, CVE-2011-0211, CVE-2011-0212, CVE-2011-0213, CVE-2011-0715, CVE-2011-0719, CVE-2011-1132, CVE-2011-1417, CVE-2011-1678, CVE-2011-2522, CVE-2011-2694, CVE-2011-2724, CVE-2012-0870, CVE-2012-1182, CVE-2012-2111, CVE-2012-6150, CVE-2013-0213, CVE-2013-0214, CVE-2013-4124, CVE-2013-4408, CVE-2013-4475, CVE-2013-4496, CVE-2013-6442, CVE-2014-0244, CVE-2014-3493, CVE-2015-0240, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-5370, CVE-2015-7560, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2115, CVE-2016-2118, CVE-2016-2125, CVE-2016-2126, CVE-2017-12150, CVE-2017-12163, CVE-2017-2619, CVE-2017-7494, CVE-2018-1050

Published on 15/09/10 - Updated on 30/10/18

Description

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

Category: Buffer Error

CWE-119 (Buffer Errors)
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

Security Notices

US National Vulnerability DatabaseCVE-2010-3069
Agence Nationale de la Sécurité des Systèmes d'Information CERTA-2010-AVI-429, CERTA-2010-AVI-583, CERTA-2011-AVI-162, CERTA-2011-AVI-369
CentOS CESA-2010:0697, CESA-2010:0698
Oracle Linux ELSA-2010-0697, ELSA-2010-0698, ELSA-2010-0860, ELSA-2012-0313, ELSA-2017-0662, ELSA-2018-1860
Redhat RHSA-2010:0697, RHSA-2010:0698, RHSA-2010:0860
Renater 2010/VULN454, 2010/VULN503, 2011/VULN246, 2011/VULN446
SUSE SUSE-SU-2012:0348

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
sambasamba

Share this vulnerability with:

Twitter Facebook LinkedIn Mail