Vulnerability Name: CVE-2004-0686 (CCN-16786) Assigned: 2004-07-22 Published: 2004-07-22 Updated: 2022-08-29 Summary: Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Thu Jul 22 2004 - 06:14:37 CDT Security Release - Samba 3.0.5 and 2.2.10 Source: MITRE Type: CNACVE-2004-0686 Source: CONECTIVA Type: Third Party AdvisoryCLA-2004:851 Source: CONECTIVA Type: Third Party AdvisoryCLA-2004:854 Source: CCN Type: Conectiva Linux Announcement CLSA-2004:851Multiple potential buffer overruns Source: CCN Type: Conectiva Linux Announcement CLSA-2004:854Multiple potential buffer overruns Source: BUGTRAQ Type: Mailing List, Third Party Advisory20040722 Security Release - Samba 3.0.5 and 2.2.10 Source: BUGTRAQ Type: Mailing List, Third Party Advisory20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba) Source: BUGTRAQ Type: Mailing List, Third Party Advisory20040722 TSSA-2004-014 - samba Source: HP Type: Mailing List, Third Party AdvisorySSRT4782 Source: FEDORA Type: Mailing List, Third Party AdvisoryFLSA:2102 Source: CCN Type: RHSA-2004-259samba security update Source: CCN Type: RHSA-2004-404samba security update Source: CCN Type: Slackware-Security Mailing List, Mon, 26 Jul 2004 15:19:49 -0700 (PDT)alternate samba package for Slackware 10.0 Source: CCN Type: Slackware-Security Mailing List, Sun, 25 Jul 2004 20:24:19 -0700 (PDT)New samba packages Source: SUNALERT Type: Broken Link101584 Source: SUNALERT Type: Broken Link57664 Source: CCN Type: Sun Alert ID: 57664Security Vulnerability in Samba May Allow Unauthorized Root Privileges Source: CCN Type: Samba Web siteSAMBA - opening windows to a wider world Source: CCN Type: CIAC Information Bulletin 0-186Samba Buffer Overrun Vulnerabilities [REVISED 5 Aug 2004] Source: CCN Type: GLSA-200407-21Samba: Multiple buffer overflows Source: GENTOO Type: Third Party AdvisoryGLSA-200407-21 Source: MANDRAKE Type: Broken LinkMDKSA-2004:071 Source: SUSE Type: Broken LinkSUSE-SA:2004:022 Source: CCN Type: OpenPKG-SA-2004.033Samba Source: REDHAT Type: Patch, Third Party AdvisoryRHSA-2004:259 Source: CCN Type: BID-10781Samba Filename Mangling Method Buffer Overrun Vulnerability Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0039Several security vulnerabilities patched Source: TRUSTIX Type: Third Party Advisory2004-0039 Source: XF Type: Third Party Advisory, VDB Entrysamba-mangling-method-bo(16786) Source: XF Type: UNKNOWNsamba-mangling-method-bo(16786) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:10461 Source: SUSE Type: SUSE-SA:2004:022samba: remote root compromise Vulnerable Configuration: Configuration 1 :cpe:/a:samba:samba:*:*:*:*:*:*:*:* (Version >= 2.2.0 and < 2.2.10)OR cpe:/a:samba:samba:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.0.5) Configuration 2 :cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:* AND cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
samba samba *
samba samba *
trustix secure linux 2.0
trustix secure linux 1.5
trustix secure linux 2.1
samba samba 3.0.2
samba samba 3.0.4
samba samba 3.0.2a
samba samba 3.0.3
hp hp-ux 11.00
hp hp-ux 11.11
trustix secure linux 1.5
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
conectiva linux 8.0
sun solaris 9
slackware slackware linux 8.1
openpkg openpkg current
gentoo linux *
suse suse linux office server *
hp hp-ux 11.22
suse suse linux 8.1
mandrakesoft mandrake multi network firewall 8.2
slackware slackware linux current
mandrakesoft mandrake linux corporate server 2.1
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
slackware slackware linux 9.0
suse suse linux 8.2
redhat enterprise linux 2.1
conectiva linux 9.0
trustix secure linux 2.0
hp hp-ux 11.23
slackware slackware linux 9.1
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
trustix secure linux 2.1
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
redhat linux advanced workstation 2.1