Vulnerability Name: | CVE-2004-0808 (CCN-17326) |
Assigned: | 2004-09-13 |
Published: | 2004-09-13 |
Updated: | 2018-10-30 |
Summary: | The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided. |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2004-0808
Source: CONECTIVA Type: Patch CLA-2004:873
Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:873 Fix for samba vulnerabilities
Source: BUGTRAQ Type: UNKNOWN 20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808)
Source: BUGTRAQ Type: UNKNOWN 20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)
Source: CCN Type: RHSA-2004-467 samba security update
Source: CCN Type: Slackware-security Mailing List, Mon, 13 Sep 2004 23:31:52 -0700 (PDT) [slackware-security] samba DoS (SSA:2004-257-01)
Source: CCN Type: Samba Web site Samba - opening windows to a wider world
Source: CCN Type: Samba History Web page Release Notes for Samba 3.0.7
Source: CCN Type: GLSA-200409-16 Samba: Denial of Service vulnerabilities
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200409-16
Source: CCN Type: iDEFENSE Security Advisory 09.13.04 Samba nmbd Invalid Length Denial of Service Vulnerability
Source: IDEFENSE Type: Patch, Vendor Advisory 20040913 Samba nmbd Invalid Length Denial of Service Vulnerability
Source: MANDRAKE Type: UNKNOWN MDKSA-2004:092
Source: CCN Type: OpenPKG-SA-2004.040 Samba
Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:467
Source: CCN Type: BID-11156 Samba Multiple ASN.1 and MailSlot Parsing Remote Denial Of Service Vulnerabilities
Source: TRUSTIX Type: Patch, Vendor Advisory 2004-0046
Source: XF Type: UNKNOWN samba-nmbd-mailslot-dos(17326)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10344
Source: SUSE Type: SUSE-SA:2004:032 apache2: remote denial-of-service
Source: SUSE Type: SUSE-SA:2004:034 XFree86-libs xshared: remote command execution
|
Vulnerable Configuration: | Configuration 1: cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:*AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:10344 | V | The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided. | 2013-04-29 | oval:org.opensuse.security:def:20040808 | V | CVE-2004-0808 | 2012-08-30 | oval:com.redhat.rhsa:def:20040467 | P | RHSA-2004:467: samba security update (Important) | 2004-09-23 |
|
BACK |
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4 rc1
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.6
samba samba 3.0.4
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.0
samba samba 3.0.5
openpkg openpkg current
gentoo linux *
suse suse linux 8.1
suse linux enterprise server 8
slackware slackware linux current
suse suse linux 8.2
conectiva linux 9.0
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
suse linux enterprise server 9
mandrakesoft mandrake linux 10.0