CVE-2017-7494
KEV
🔴 Łataj teraz
Luka w Samba umożliwia zdalne wykonanie kodu przez złośliwego klienta.
CVSS
9.8
EPSS
94.2%
Exploit
weaponized
Vendor
samba
Opis źródłowy (NVD)
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 94.2% |
| Opublikowano (NVD) | 2017-05-30 18:29:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 19:36:42 UTC |
Referencje
- http://www.debian.org/security/2017/dsa-3860 (secalert@redhat.com) [Third Party Advisory]
- http://www.securityfocus.com/bid/98636 (secalert@redhat.com) [Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1038552 (secalert@redhat.com) [Third Party Advisory, VDB Entry]
- https://access.redhat.com/errata/RHSA-2017:1270 (secalert@redhat.com) [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2017:1271 (secalert@redhat.com) [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2017:1272 (secalert@redhat.com) [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2017:1273 (secalert@redhat.com) [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2017:1390 (secalert@redhat.com) [Third Party Advisory]
- https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01 (secalert@redhat.com) [Third Party Advisory]
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us (secalert@redhat.com) [Third Party Advisory]
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us (secalert@redhat.com) [Third Party Advisory]
- https://security.gentoo.org/glsa/201805-07 (secalert@redhat.com) [Third Party Advisory]
- https://security.netapp.com/advisory/ntap-20170524-0001/ (secalert@redhat.com) [Third Party Advisory]
- https://www.exploit-db.com/exploits/42060/ (secalert@redhat.com) [Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/42084/ (secalert@redhat.com) [Third Party Advisory, VDB Entry]
- https://www.samba.org/samba/security/CVE-2017-7494.html (secalert@redhat.com) [Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7494 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]