English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 119323 CVE Beschreibungen
und 58880 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.835166
Kategorie:HP-UX Local Security Checks
Titel:HP-UX Update for HP CIFS Server (Samba) HPSBUX02341
Zusammenfassung:Check for the Version of HP CIFS Server (Samba)
Beschreibung:Description:


Vulnerability Insight:
A potential security vulnerabilities has been identified with HP-UX running
HP CIFS Server (Samba). The vulnerabilities could be exploited remotely to
execute arbitrary code.

Impact:
Remote execution of arbitrary code

Affected Software/OS:
HP CIFS Server (Samba) on
HP CIFS Server vA.02.01.*, vA.02.02.*, and vA.2.03.* prior to vA.02.03.04
running on HP-UX B.11.11, B.11.23, and B.11.31.

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657-1

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-4572
Bugtraq: 20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485936/100/0/threaded
Bugtraq: 20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486859/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
Debian Security Information: DSA-1409 (Google Search)
http://www.debian.org/security/2007/dsa-1409
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html
http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml
HPdes Security Advisory: HPSBUX02316
http://marc.info/?l=bugtraq&m=120524782005154&w=2
HPdes Security Advisory: SSRT071495
HPdes Security Advisory: HPSBUX02341
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
HPdes Security Advisory: SSRT080075
http://www.mandriva.com/security/advisories?name=MDKSA-2007:224
http://www.redhat.com/support/errata/RHSA-2007-1013.html
http://www.redhat.com/support/errata/RHSA-2007-1016.html
http://www.redhat.com/support/errata/RHSA-2007-1017.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1
SuSE Security Announcement: SUSE-SA:2007:065 (Google Search)
http://www.novell.com/linux/security/advisories/2007_65_samba.html
http://www.ubuntulinux.org/support/documentation/usn/usn-544-1
http://www.ubuntu.com/usn/usn-544-2
http://www.ubuntu.com/usn/usn-617-1
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
BugTraq ID: 26454
http://www.securityfocus.com/bid/26454
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132
http://www.vupen.com/english/advisories/2007/3869
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2008/0064
http://www.vupen.com/english/advisories/2008/0859/references
http://www.vupen.com/english/advisories/2008/1712/references
http://www.vupen.com/english/advisories/2008/1908
http://securitytracker.com/id?1018954
http://secunia.com/advisories/27450
http://secunia.com/advisories/27679
http://secunia.com/advisories/27682
http://secunia.com/advisories/27691
http://secunia.com/advisories/27701
http://secunia.com/advisories/27720
http://secunia.com/advisories/27731
http://secunia.com/advisories/27787
http://secunia.com/advisories/27927
http://secunia.com/advisories/28136
http://secunia.com/advisories/28368
http://secunia.com/advisories/29341
http://secunia.com/advisories/30484
http://secunia.com/advisories/30736
http://secunia.com/advisories/30835
XForce ISS Database: samba-nmbd-bo(38501)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38501
Common Vulnerability Exposure (CVE) ID: CVE-2007-5398
Bugtraq: 20071115 Secunia Research: Samba "reply_netbios_packet()" Buffer OverflowVulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/483744/100/0/threaded
http://secunia.com/secunia_research/2007-90/advisory/
BugTraq ID: 26455
http://www.securityfocus.com/bid/26455
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230
http://securitytracker.com/id?1018953
http://secunia.com/advisories/27742
http://securityreason.com/securityalert/3372
XForce ISS Database: samba-replynetbiospacket-bo(38502)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38502
Common Vulnerability Exposure (CVE) ID: CVE-2007-6015
Bugtraq: 20071210 Secunia Research: Samba "send_mailslot()" Buffer OverflowVulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/484818/100/0/threaded
Bugtraq: 20071210 [SECURITY] Buffer overrun in send_mailslot() (Google Search)
http://www.securityfocus.com/archive/1/archive/1/484825/100/0/threaded
Bugtraq: 20071210 rPSA-2007-0261-1 samba samba-swat (Google Search)
http://www.securityfocus.com/archive/1/archive/1/484827/100/0/threaded
Bugtraq: 20071214 POC for samba send_mailslot() (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485144/100/0/threaded
Bugtraq: 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates (Google Search)
http://www.securityfocus.com/archive/1/archive/1/488457/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
http://secunia.com/secunia_research/2007-99/advisory/
http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
Debian Security Information: DSA-1427 (Google Search)
http://www.debian.org/security/2007/dsa-1427
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
http://security.gentoo.org/glsa/glsa-200712-10.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
http://www.redhat.com/support/errata/RHSA-2007-1114.html
http://www.redhat.com/support/errata/RHSA-2007-1117.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
SuSE Security Announcement: SUSE-SA:2007:068 (Google Search)
http://www.novell.com/linux/security/advisories/2007_68_samba.html
http://www.ubuntu.com/usn/usn-556-1
Cert/CC Advisory: TA08-043B
http://www.us-cert.gov/cas/techalerts/TA08-043B.html
CERT/CC vulnerability note: VU#438395
http://www.kb.cert.org/vuls/id/438395
BugTraq ID: 26791
http://www.securityfocus.com/bid/26791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
http://www.vupen.com/english/advisories/2007/4153
http://www.vupen.com/english/advisories/2008/0495/references
http://www.vupen.com/english/advisories/2008/0637
http://www.securitytracker.com/id?1019065
http://secunia.com/advisories/27760
http://secunia.com/advisories/27894
http://secunia.com/advisories/27977
http://secunia.com/advisories/27993
http://secunia.com/advisories/27999
http://secunia.com/advisories/28003
http://secunia.com/advisories/28028
http://secunia.com/advisories/28029
http://secunia.com/advisories/28067
http://secunia.com/advisories/28089
http://secunia.com/advisories/28037
http://secunia.com/advisories/28891
http://secunia.com/advisories/29032
http://securityreason.com/securityalert/3438
XForce ISS Database: samba-sendmailslot-bo(38965)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
Common Vulnerability Exposure (CVE) ID: CVE-2008-1105
Bugtraq: 20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492683/100/0/threaded
Bugtraq: 20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492903/100/0/threaded
Bugtraq: 20080529 Secunia Research: Samba "receive_smb_raw()" Buffer OverflowVulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492737/100/0/threaded
https://www.exploit-db.com/exploits/5712
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
http://secunia.com/secunia_research/2008-20/advisory/
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Debian Security Information: DSA-1590 (Google Search)
http://www.debian.org/security/2008/dsa-1590
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html
http://security.gentoo.org/glsa/glsa-200805-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:108
http://www.redhat.com/support/errata/RHSA-2008-0288.html
http://www.redhat.com/support/errata/RHSA-2008-0289.html
http://www.redhat.com/support/errata/RHSA-2008-0290.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473951
http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1
SuSE Security Announcement: SUSE-SA:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html
http://www.ubuntu.com/usn/usn-617-2
BugTraq ID: 29404
http://www.securityfocus.com/bid/29404
BugTraq ID: 31255
http://www.securityfocus.com/bid/31255
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020
http://secunia.com/advisories/30449
http://secunia.com/advisories/30478
http://secunia.com/advisories/30442
http://www.vupen.com/english/advisories/2008/1681
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2008/2222/references
http://www.vupen.com/english/advisories/2008/2639
http://securitytracker.com/id?1020123
http://secunia.com/advisories/30228
http://secunia.com/advisories/30385
http://secunia.com/advisories/30543
http://secunia.com/advisories/30489
http://secunia.com/advisories/30802
http://secunia.com/advisories/31246
http://secunia.com/advisories/31911
http://secunia.com/advisories/30396
http://secunia.com/advisories/33696
XForce ISS Database: xerox-controller-samba-code-execution(45251)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45251
XForce ISS Database: samba-receivesmbraw-bo(42664)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42664
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 58880 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2018 E-Soft Inc. Alle Rechte vorbehalten.