Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=c5c859de4097729449c1f4f087b4b7c97a7ecd36

commit c5c859de4097729449c1f4f087b4b7c97a7ecd36
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Sun Jan 13 14:21:07 2008 +0100

FSA335-samba

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 6e564a8..4ae3494 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>335</id>
+               <date>2008-01-13</date>
+               <author>vmiklos</author>
+               <package>samba</package>
+               <vulnerable>3.0.26-2sayshell1</vulnerable>
+               <unaffected>3.0.26-2sayshell2</unaffected>
+               <bts>http://bugs.frugalware.org/task/2666</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015</cve>
+               <desc>Secunia Research has discovered a vulnerability in Samba, 
which can be exploited by malicious people to compromise a vulnerable system.
+                       The vulnerability is caused due to a boundary error 
within the "send_mailslot()" function. This can be exploited to cause a 
stack-based buffer overflow with zero bytes via a specially crafted "SAMLOGON" 
domain logon packet containing a username string placed at an odd offset 
followed by an overly long GETDC string.
+                       Successful exploitation allows execution of arbitrary 
code, but requires that the "domain logons" option is enabled.</desc>
+       </fsa>
+       <fsa>
<id>334</id>
<date>2008-01-12</date>
<author>vmiklos</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to