Vulnerability Name: CVE-2004-0808 (CCN-17326) Assigned: 2004-09-13 Published: 2004-09-13 Updated: 2018-10-30 Summary: The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2004-0808 Source: CONECTIVA Type: PatchCLA-2004:873 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:873Fix for samba vulnerabilities Source: BUGTRAQ Type: UNKNOWN20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808) Source: BUGTRAQ Type: UNKNOWN20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba) Source: CCN Type: RHSA-2004-467samba security update Source: CCN Type: Slackware-security Mailing List, Mon, 13 Sep 2004 23:31:52 -0700 (PDT)[slackware-security] samba DoS (SSA:2004-257-01) Source: CCN Type: Samba Web siteSamba - opening windows to a wider world Source: CCN Type: Samba History Web pageRelease Notes for Samba 3.0.7 Source: CCN Type: GLSA-200409-16Samba: Denial of Service vulnerabilities Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200409-16 Source: CCN Type: iDEFENSE Security Advisory 09.13.04Samba nmbd Invalid Length Denial of Service Vulnerability Source: IDEFENSE Type: Patch, Vendor Advisory20040913 Samba nmbd Invalid Length Denial of Service Vulnerability Source: MANDRAKE Type: UNKNOWNMDKSA-2004:092 Source: CCN Type: OpenPKG-SA-2004.040Samba Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2004:467 Source: CCN Type: BID-11156Samba Multiple ASN.1 and MailSlot Parsing Remote Denial Of Service Vulnerabilities Source: TRUSTIX Type: Patch, Vendor Advisory2004-0046 Source: XF Type: UNKNOWNsamba-nmbd-mailslot-dos(17326) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10344 Source: SUSE Type: SUSE-SA:2004:032apache2: remote denial-of-service Source: SUSE Type: SUSE-SA:2004:034XFree86-libs xshared: remote command execution Vulnerable Configuration: Configuration 1 :cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:* AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:10344 V The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided. 2013-04-29 oval:org.opensuse.security:def:20040808 V CVE-2004-0808 2012-08-30 oval:com.redhat.rhsa:def:20040467 P RHSA-2004:467: samba security update (Important) 2004-09-23
BACK
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4 rc1
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.6
samba samba 3.0.4
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.0
samba samba 3.0.5
openpkg openpkg current
gentoo linux *
suse suse linux 8.1
suse linux enterprise server 8
slackware slackware linux current
suse suse linux 8.2
conectiva linux 9.0
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
suse linux enterprise server 9
mandrakesoft mandrake linux 10.0