https://security.gd-linux.com/info/CVE-2008-1105
https://security.gd-linux.com/info/CVE-2009-2813
https://security.gd-linux.com/info/CVE-2009-2906
https://security.gd-linux.com/info/CVE-2009-2948
https://security.gd-linux.com/info/CVE-2012-0817
https://security.gd-linux.com/info/CVE-2012-1182
https://security.gd-linux.com/info/CVE-2012-2111
https://security.gd-linux.com/info/CVE-2012-6150
https://security.gd-linux.com/info/CVE-2013-0172
https://security.gd-linux.com/info/CVE-2013-0213
https://security.gd-linux.com/info/CVE-2013-0214
https://security.gd-linux.com/info/CVE-2013-4408
https://security.gd-linux.com/info/CVE-2013-4475
https://security.gd-linux.com/info/CVE-2013-4496
https://security.gd-linux.com/info/CVE-2013-6442
https://security.gd-linux.com/info/CVE-2014-0178
https://security.gd-linux.com/info/CVE-2014-0244
https://security.gd-linux.com/info/CVE-2014-3493
https://security.gd-linux.com/info/CVE-2014-3560
https://security.gd-linux.com/info/CVE-2015-3223
https://security.gd-linux.com/info/CVE-2015-5252
https://security.gd-linux.com/info/CVE-2015-5296
https://security.gd-linux.com/info/CVE-2015-5299
https://security.gd-linux.com/info/CVE-2015-5370
https://security.gd-linux.com/info/CVE-2015-7540
https://security.gd-linux.com/info/CVE-2015-7560
https://security.gd-linux.com/info/CVE-2016-2110
https://security.gd-linux.com/info/CVE-2016-2111
https://security.gd-linux.com/info/CVE-2016-2112
https://security.gd-linux.com/info/CVE-2016-2113
https://security.gd-linux.com/info/CVE-2016-2114
https://security.gd-linux.com/info/CVE-2016-2115
https://security.gd-linux.com/info/CVE-2016-2118
https://security.gd-linux.com/info/CVE-2016-2119
https://security.gd-linux.com/info/CVE-2016-2123
https://security.gd-linux.com/info/CVE-2016-2125
https://security.gd-linux.com/info/CVE-2016-2126
https://security.gd-linux.com/info/CVE-2017-12150
https://security.gd-linux.com/info/CVE-2017-12151
https://security.gd-linux.com/info/CVE-2017-12163
https://security.gd-linux.com/info/CVE-2017-14746
https://security.gd-linux.com/info/CVE-2017-15275
https://security.gd-linux.com/info/CVE-2017-2619
https://security.gd-linux.com/info/CVE-2017-7494
https://security.gd-linux.com/info/CVE-2018-1050
https://security.gd-linux.com/info/CVE-2018-1057
https://security.gd-linux.com/info/CVE-2018-10858
https://security.gd-linux.com/info/CVE-2018-10918
https://security.gd-linux.com/info/CVE-2018-10919
https://security.gd-linux.com/info/CVE-2018-1139
https://security.gd-linux.com/info/CVE-2020-14383
https://security.gd-linux.com/info/CVE-2021-44142
https://security.gd-linux.com/info/CVE-2023-34966
https://security.gd-linux.com/info/CVE-2023-34967
https://security.gd-linux.com/notice/NS-SA-2024-0054
Severity: Critical
ID: 206855
File Name: newstart_cgsl_NS-SA-2024-0054_samba.nasl
Version: 1.3
Type: local
Published: 9/10/2024
Updated: 9/17/2024
Supported Sensors: Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2017-7494
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:samba-common, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:samba-libs, p-cpe:/a:zte:cgsl_main:samba-winbind, p-cpe:/a:zte:cgsl_main:samba-winbind-modules, p-cpe:/a:zte:cgsl_main:samba, p-cpe:/a:zte:cgsl_main:samba-common-libs, p-cpe:/a:zte:cgsl_main:samba-client-libs, p-cpe:/a:zte:cgsl_main:libwbclient, p-cpe:/a:zte:cgsl_main:libsmbclient, p-cpe:/a:zte:cgsl_main:samba-winbind-clients, p-cpe:/a:zte:cgsl_main:samba-client, p-cpe:/a:zte:cgsl_main:samba-common-tools
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/3/2024
Vulnerability Publication Date: 5/14/2007
CISA Known Exploited Vulnerability Due Dates: 4/20/2023
CANVAS (CANVAS)
Core Impact
Metasploit (Samba lsa_io_trans_names Heap Overflow)
CVE: CVE-2007-2446, CVE-2007-2447, CVE-2008-1105, CVE-2009-2813, CVE-2009-2906, CVE-2009-2948, CVE-2012-0817, CVE-2012-1182, CVE-2012-2111, CVE-2012-6150, CVE-2013-0172, CVE-2013-0213, CVE-2013-0214, CVE-2013-4408, CVE-2013-4475, CVE-2013-4496, CVE-2013-6442, CVE-2014-0178, CVE-2014-0244, CVE-2014-3493, CVE-2014-3560, CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5370, CVE-2015-7540, CVE-2015-7560, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118, CVE-2016-2119, CVE-2016-2123, CVE-2016-2125, CVE-2016-2126, CVE-2017-12150, CVE-2017-12151, CVE-2017-12163, CVE-2017-14746, CVE-2017-15275, CVE-2017-2619, CVE-2017-7494, CVE-2018-1050, CVE-2018-1057, CVE-2018-10858, CVE-2018-10918, CVE-2018-10919, CVE-2018-1139, CVE-2020-14383, CVE-2021-44142, CVE-2023-34966, CVE-2023-34967
IAVA: 2016-A-0002-S, 2016-A-0095-S, 2016-A-0195-S, 2016-A-0353-S, 2017-A-0085-S, 2017-A-0163-S, 2017-A-0281-S, 2017-A-0344-S, 2018-A-0074-S, 2018-A-0257-S, 2020-A-0508-S, 2022-A-0054-S, 2023-A-0376-S
IAVB: 2009-B-0050-S, 2012-B-0045-S, 2012-B-0047-S, 2013-B-0006-S, 2013-B-0010-S, 2013-B-0131-S, 2014-B-0067-S, 2014-B-0105-S