Vulnerability Description
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 2.2.0, < 2.2.10 |
| Trustix | Secure Linux | 1.5 |
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000851Third Party Advisory
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000854Third Party Advisory
- http://marc.info/?l=bugtraq&m=109051340810458&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109051533021376&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109052891507263&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109094272328981&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109785827607823&w=2Mailing ListThird Party Advisory
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1Broken Link
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1Broken Link
- http://www.gentoo.org/security/en/glsa/glsa-200407-21.xmlThird Party Advisory
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071Broken Link
- http://www.novell.com/linux/security/advisories/2004_22_samba.htmlBroken Link
- http://www.redhat.com/support/errata/RHSA-2004-259.htmlPatchThird Party Advisory
- http://www.trustix.org/errata/2004/0039/Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16786Third Party AdvisoryVDB Entry
FAQ
What is CVE-2004-0686?
CVE-2004-0686 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
How severe is CVE-2004-0686?
CVE-2004-0686 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0686?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Trustix Secure Linux.