Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=c5c859de4097729449c1f4f087b4b7c97a7ecd36
commit c5c859de4097729449c1f4f087b4b7c97a7ecd36 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Sun Jan 13 14:21:07 2008 +0100 FSA335-samba diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 6e564a8..4ae3494 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>335</id> + <date>2008-01-13</date> + <author>vmiklos</author> + <package>samba</package> + <vulnerable>3.0.26-2sayshell1</vulnerable> + <unaffected>3.0.26-2sayshell2</unaffected> + <bts>http://bugs.frugalware.org/task/2666</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015</cve> + <desc>Secunia Research has discovered a vulnerability in Samba, which can be exploited by malicious people to compromise a vulnerable system. + The vulnerability is caused due to a boundary error within the "send_mailslot()" function. This can be exploited to cause a stack-based buffer overflow with zero bytes via a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string. + Successful exploitation allows execution of arbitrary code, but requires that the "domain logons" option is enabled.</desc> + </fsa> + <fsa> <id>334</id> <date>2008-01-12</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
