{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-7494", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "since 3.5.0" } ] } } ] }, "vendor_name": "Samba" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "98636", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98636" }, { "name": "DSA-3860", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3860" }, { "name": "42084", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42084/" }, { "name": "RHSA-2017:1270", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1270" }, { "name": "https://www.samba.org/samba/security/CVE-2017-7494.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-7494.html" }, { "name": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01", "refsource": "MISC", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01" }, { "name": "RHSA-2017:1390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1390" }, { "name": "1038552", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038552" }, { "name": "RHSA-2017:1273", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1273" }, { "name": "RHSA-2017:1271", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1271" }, { "name": "GLSA-201805-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us" }, { "name": "RHSA-2017:1272", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1272" }, { "name": "https://security.netapp.com/advisory/ntap-20170524-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170524-0001/" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us" }, { "name": "42060", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42060/" } ] } }