Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:18964
[Eng]
Version
9
Class
vulnerability
ALTXid
173332
Language
Russian
Severity
Critical
Title
ALT Linux -- уязвимость в samba-DC (CVE-2013-4124)
Description
Исправление уязвимости CVE-2013-4124
Family
unix
Platform
ALT Linux SPT 7.0
Product
samba-DC
Reference
packetstormsecurity: Samba-Remote-Denial-Of-Service
packetstormsecurity: Samba-Remote-Denial-Of-Service
Id:
Samba-Remote-Denial-Of-Service
Reference:
https://packetstormsecurity.com/files/122894/Samba-Remote-Denial-Of-Service.html
packetstormsecurity: Samba-nttrans-Denial-Of-Service
packetstormsecurity: Samba-nttrans-Denial-Of-Service
Id:
Samba-nttrans-Denial-Of-Service
Reference:
https://packetstormsecurity.com/files/122936/Samba-nttrans-Denial-Of-Service.html
FSTEC: BDU:2015-08948
FSTEC: BDU:2015-08948
Id:
BDU:2015-08948
Reference:
https://bdu.fstec.ru/vul/2015-08948
FSTEC: BDU:2015-08947
FSTEC: BDU:2015-08947
Id:
BDU:2015-08947
Reference:
https://bdu.fstec.ru/vul/2015-08947
FSTEC: BDU:2015-08946
FSTEC: BDU:2015-08946
Id:
BDU:2015-08946
Reference:
https://bdu.fstec.ru/vul/2015-08946
FSTEC: BDU:2015-08945
FSTEC: BDU:2015-08945
Id:
BDU:2015-08945
Reference:
https://bdu.fstec.ru/vul/2015-08945
FSTEC: BDU:2015-08944
FSTEC: BDU:2015-08944
Id:
BDU:2015-08944
Reference:
https://bdu.fstec.ru/vul/2015-08944
FSTEC: BDU:2015-06525
FSTEC: BDU:2015-06525
Id:
BDU:2015-06525
Reference:
https://bdu.fstec.ru/vul/2015-06525
FSTEC: BDU:2015-06517
FSTEC: BDU:2015-06517
Id:
BDU:2015-06517
Reference:
https://bdu.fstec.ru/vul/2015-06517
FSTEC: BDU:2015-06512
FSTEC: BDU:2015-06512
Id:
BDU:2015-06512
Reference:
https://bdu.fstec.ru/vul/2015-06512
FSTEC: BDU:2015-06507
FSTEC: BDU:2015-06507
Id:
BDU:2015-06507
Reference:
https://bdu.fstec.ru/vul/2015-06507
FSTEC: BDU:2015-06326
FSTEC: BDU:2015-06326
Id:
BDU:2015-06326
Reference:
https://bdu.fstec.ru/vul/2015-06326
FSTEC: BDU:2015-06324
FSTEC: BDU:2015-06324
Id:
BDU:2015-06324
Reference:
https://bdu.fstec.ru/vul/2015-06324
FSTEC: BDU:2015-06052
FSTEC: BDU:2015-06052
Id:
BDU:2015-06052
Reference:
https://bdu.fstec.ru/vul/2015-06052
FSTEC: BDU:2015-06051
FSTEC: BDU:2015-06051
Id:
BDU:2015-06051
Reference:
https://bdu.fstec.ru/vul/2015-06051
FSTEC: BDU:2015-05679
FSTEC: BDU:2015-05679
Id:
BDU:2015-05679
Reference:
https://bdu.fstec.ru/vul/2015-05679
FSTEC: BDU:2015-05678
FSTEC: BDU:2015-05678
Id:
BDU:2015-05678
Reference:
https://bdu.fstec.ru/vul/2015-05678
FSTEC: BDU:2015-05677
FSTEC: BDU:2015-05677
Id:
BDU:2015-05677
Reference:
https://bdu.fstec.ru/vul/2015-05677
FSTEC: BDU:2015-05676
FSTEC: BDU:2015-05676
Id:
BDU:2015-05676
Reference:
https://bdu.fstec.ru/vul/2015-05676
FSTEC: BDU:2015-05675
FSTEC: BDU:2015-05675
Id:
BDU:2015-05675
Reference:
https://bdu.fstec.ru/vul/2015-05675
FSTEC: BDU:2015-05674
FSTEC: BDU:2015-05674
Id:
BDU:2015-05674
Reference:
https://bdu.fstec.ru/vul/2015-05674
FSTEC: BDU:2015-05673
FSTEC: BDU:2015-05673
Id:
BDU:2015-05673
Reference:
https://bdu.fstec.ru/vul/2015-05673
FSTEC: BDU:2015-05672
FSTEC: BDU:2015-05672
Id:
BDU:2015-05672
Reference:
https://bdu.fstec.ru/vul/2015-05672
FSTEC: BDU:2015-05671
FSTEC: BDU:2015-05671
Id:
BDU:2015-05671
Reference:
https://bdu.fstec.ru/vul/2015-05671
FSTEC: BDU:2015-05670
FSTEC: BDU:2015-05670
Id:
BDU:2015-05670
Reference:
https://bdu.fstec.ru/vul/2015-05670
FSTEC: BDU:2015-05669
FSTEC: BDU:2015-05669
Id:
BDU:2015-05669
Reference:
https://bdu.fstec.ru/vul/2015-05669
FSTEC: BDU:2015-05668
FSTEC: BDU:2015-05668
Id:
BDU:2015-05668
Reference:
https://bdu.fstec.ru/vul/2015-05668
FSTEC: BDU:2015-05667
FSTEC: BDU:2015-05667
Id:
BDU:2015-05667
Reference:
https://bdu.fstec.ru/vul/2015-05667
FSTEC: BDU:2015-05666
FSTEC: BDU:2015-05666
Id:
BDU:2015-05666
Reference:
https://bdu.fstec.ru/vul/2015-05666
FSTEC: BDU:2015-05665
FSTEC: BDU:2015-05665
Id:
BDU:2015-05665
Reference:
https://bdu.fstec.ru/vul/2015-05665
FSTEC: BDU:2015-05664
FSTEC: BDU:2015-05664
Id:
BDU:2015-05664
Reference:
https://bdu.fstec.ru/vul/2015-05664
FSTEC: BDU:2015-05663
FSTEC: BDU:2015-05663
Id:
BDU:2015-05663
Reference:
https://bdu.fstec.ru/vul/2015-05663
FSTEC: BDU:2015-05662
FSTEC: BDU:2015-05662
Id:
BDU:2015-05662
Reference:
https://bdu.fstec.ru/vul/2015-05662
FSTEC: BDU:2015-05661
FSTEC: BDU:2015-05661
Id:
BDU:2015-05661
Reference:
https://bdu.fstec.ru/vul/2015-05661
FSTEC: BDU:2015-05660
FSTEC: BDU:2015-05660
Id:
BDU:2015-05660
Reference:
https://bdu.fstec.ru/vul/2015-05660
FSTEC: BDU:2015-05659
FSTEC: BDU:2015-05659
Id:
BDU:2015-05659
Reference:
https://bdu.fstec.ru/vul/2015-05659
FSTEC: BDU:2015-05658
FSTEC: BDU:2015-05658
Id:
BDU:2015-05658
Reference:
https://bdu.fstec.ru/vul/2015-05658
FSTEC: BDU:2015-05657
FSTEC: BDU:2015-05657
Id:
BDU:2015-05657
Reference:
https://bdu.fstec.ru/vul/2015-05657
FSTEC: BDU:2015-05656
FSTEC: BDU:2015-05656
Id:
BDU:2015-05656
Reference:
https://bdu.fstec.ru/vul/2015-05656
FSTEC: BDU:2015-05655
FSTEC: BDU:2015-05655
Id:
BDU:2015-05655
Reference:
https://bdu.fstec.ru/vul/2015-05655
FSTEC: BDU:2015-05654
FSTEC: BDU:2015-05654
Id:
BDU:2015-05654
Reference:
https://bdu.fstec.ru/vul/2015-05654
FSTEC: BDU:2015-05653
FSTEC: BDU:2015-05653
Id:
BDU:2015-05653
Reference:
https://bdu.fstec.ru/vul/2015-05653
FSTEC: BDU:2015-05652
FSTEC: BDU:2015-05652
Id:
BDU:2015-05652
Reference:
https://bdu.fstec.ru/vul/2015-05652
FSTEC: BDU:2015-05651
FSTEC: BDU:2015-05651
Id:
BDU:2015-05651
Reference:
https://bdu.fstec.ru/vul/2015-05651
FSTEC: BDU:2015-05650
FSTEC: BDU:2015-05650
Id:
BDU:2015-05650
Reference:
https://bdu.fstec.ru/vul/2015-05650
FSTEC: BDU:2015-05649
FSTEC: BDU:2015-05649
Id:
BDU:2015-05649
Reference:
https://bdu.fstec.ru/vul/2015-05649
FSTEC: BDU:2015-05648
FSTEC: BDU:2015-05648
Id:
BDU:2015-05648
Reference:
https://bdu.fstec.ru/vul/2015-05648
FSTEC: BDU:2015-05647
FSTEC: BDU:2015-05647
Id:
BDU:2015-05647
Reference:
https://bdu.fstec.ru/vul/2015-05647
CVE: CVE-2013-4124
CVE: CVE-2013-4124
Id:
CVE-2013-4124
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
Comment
: Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
189 (Numeric Errors)
References:
http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=984401 (CONFIRM)
http://www.samba.org/samba/history/samba-3.6.17.html (CONFIRM)
http://www.samba.org/samba/history/samba-4.0.8.html (CONFIRM)
http://www.samba.org/samba/security/CVE-2013-4124 (CONFIRM)
http://www.samba.org/samba/history/samba-3.5.22.html (CONFIRM)
1028882 (SECTRACK)
20130806 [slackware-security] samba (SSA:2013-218-03) (BUGTRAQ)
openSUSE-SU-2013:1349 (SUSE)
MDVSA-2013:207 (MANDRIVA)
openSUSE-SU-2013:1339 (SUSE)
95969 (OSVDB)
54519 (SECUNIA)
FEDORA-2013-14355 (FEDORA)
FEDORA-2013-14312 (FEDORA)
USN-1966-1 (UBUNTU)
RHSA-2013:1310 (REDHAT)
RHSA-2013:1543 (REDHAT)
RHSA-2013:1542 (REDHAT)
RHSA-2014:0305 (REDHAT)
GLSA-201502-15 (GENTOO)
SSRT101413 (HP)
FEDORA-2014-9132 (FEDORA)
samba-cve20134121-dos(86185) (XF)
VENDOR: otchet-po-obnovleniiam-ot-16032018
VENDOR: otchet-po-obnovleniiam-ot-16032018
Id:
otchet-po-obnovleniiam-ot-16032018
Reference:
https://cve.basealt.ru/otchet-po-obnovleniiam-ot-16032018.html
Content available only for registered users!
ovaldb@altx-soft.com