Lucene search

K
sambaSamba SecuritySAMBA:CVE-2004-0686
HistoryJul 22, 2004 - 12:00 a.m.

Potential Buffer Overrun in smbd

2004-07-2200:00:00
Samba Security
www.samba.org
34

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.797 High

EPSS

Percentile

98.3%

Description

A buffer overrun has been located in the code used to support
the ‘mangling method = hash’ smb.conf option. Please be aware
that the default setting for this parameter is ‘mangling method
= hash2’ and therefore not vulnerable.

Affected Samba 3 installations can avoid this possible security
bug by using the default hash2 mangling method. Server
installations requiring the hash mangling method are encouraged
to upgrade to Samba 3.0.5.

Protecting Unpatched Servers

The Samba Team always encourages users to run the latest stable
release as a defense of against attacks. However, under certain
circumstances it may not be possible to immediately upgrade
important installations. In such cases, administrators should
read the “Server Security” documentation found at
http://www.samba.org/samba/docs/server_security.html.

Credits

This defect was located by Samba developers during a routine
code audit.

Our Code, Our Bugs, Our Responsibility.

			-- The Samba Team

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.797 High

EPSS

Percentile

98.3%