Required CVE Record Information
Description
Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
References 10 Total
- http://us2.samba.org/samba/ftp/pam_smb/
- distro.conectiva.com.br: CLA-2003:734 vendor-advisory
- redhat.com: RHSA-2003:261 vendor-advisory
- marc.info: 20030901 GLSA: pam_smb (200309-01) mailing-list
- redhat.com: RHSA-2003:262 vendor-advisory
- kb.cert.org: VU#680260 third-party-advisory
- secunia.com: 9611 third-party-advisory
- debian.org: DSA-374 vendor-advisory
- oval.cisecurity.org: oval:org.mitre.oval:def:469 vdb-entrysignature
- turbolinux.com: TLSA-2003-50 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 10 Total
- http://us2.samba.org/samba/ftp/pam_smb/ x_transferred
- distro.conectiva.com.br: CLA-2003:734 vendor-advisoryx_transferred
- redhat.com: RHSA-2003:261 vendor-advisoryx_transferred
- marc.info: 20030901 GLSA: pam_smb (200309-01) mailing-listx_transferred
- redhat.com: RHSA-2003:262 vendor-advisoryx_transferred
- kb.cert.org: VU#680260 third-party-advisoryx_transferred
- secunia.com: 9611 third-party-advisoryx_transferred
- debian.org: DSA-374 vendor-advisoryx_transferred
- oval.cisecurity.org: oval:org.mitre.oval:def:469 vdb-entrysignaturex_transferred
- turbolinux.com: TLSA-2003-50 vendor-advisoryx_transferred