Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000734 - | |
References | () http://marc.info/?l=bugtraq&m=106252769930090&w=2 - | |
References | () http://secunia.com/advisories/9611 - | |
References | () http://us2.samba.org/samba/ftp/pam_smb/ - | |
References | () http://www.debian.org/security/2003/dsa-374 - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/680260 - US Government Resource | |
References | () http://www.redhat.com/support/errata/RHSA-2003-261.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2003-262.html - Patch, Vendor Advisory | |
References | () http://www.turbolinux.com/security/TLSA-2003-50.txt - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A469 - |
Information
Published : 2003-10-20 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0686
Mitre link : CVE-2003-0686
CVE.ORG link : CVE-2003-0686
JSON object : View
Products Affected
redhat
- pam_smb
dave_airlie
- pam_smb
CWE