MEDIUM · 5.0

CVE-2004-0686

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

Vulnerability Description

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
SambaSamba>= 2.2.0, < 2.2.10
TrustixSecure Linux1.5

References

FAQ

What is CVE-2004-0686?

CVE-2004-0686 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

How severe is CVE-2004-0686?

CVE-2004-0686 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2004-0686?

Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Trustix Secure Linux.