CVE-2004-0930
https://notcve.org/view.php?id=CVE-2004-0930
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=109993720717957&w=2 http://marc.info/?l=bugtraq&m=110330519803655&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1 http://www.gentoo.org/ •
CVE-2004-1002
https://notcve.org/view.php?id=CVE-2004-1002
Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location. • http://www.securityfocus.com/archive/1/379450 https://exchange.xforce.ibmcloud.com/vulnerabilities/17874 https://www.ubuntu.com/usn/usn-12-1 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2004-0815
https://notcve.org/view.php?id=CVE-2004-0815
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames. La función unix_clena_name en Samba 2.2.x a 2.2.11, y 3.0.x anterirores a 3.0.2a, recorta ciertos nombres de directorio a sus rutas absolutas, lo que podría permitir a atacantes evitar la restricticiones de espeficadas de lectura, ejecución y listado de carpetas compartidas mediante secuencias del estilo "/.////" en rutas. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 http://marc.info/?l=bugtraq&m=109655827913457&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1 http://sunsolve.sun.com/search/document.do? •
CVE-2004-0808
https://notcve.org/view.php?id=CVE-2004-0808
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 http://marc.info/?l=bugtraq&m=109509335230495&w=2 http://marc.info/?l=bugtraq&m=109526231623307&w=2 http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml http://www.idefense.com/application/poi/display?id=138&type=vulnerabilities http://www.mandrakesecure.net/en/advisories/advisory.php? •
CVE-2004-0807
https://notcve.org/view.php?id=CVE-2004-0807
Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop. • ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 http://marc.info/?l=bugtraq&m=109509335230495&w=2 http://marc.info/?l=bugtraq&m=109526231623307&w=2 http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml http://www.idefense.com/application/poi/display?id=139&type=vulnerabilities http://www.mandrakesecure.net/en/advisories/advisory.php? •