// For flags

CVE-2004-0686

sambaOverruns.txt

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

Desbordamiento de búfer en Samba 2.2.x a 2.2.9 y 3.0.0 a 3.0.4, cuando la opción "mangling method = hash" está establecida en smb.conf, con impacto y vectores de ataque desconocidos.

Samba versions greater or equal to 2.2.29 and 3.0.0 have a buffer overrun located in the code used to support the mangling method = hash smb.conf option. Versions 3.0.2 suffer from buffer overrun in an internal routine used to decode base64 data during HTTP basic authentication.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2004-07-13 CVE Reserved
  • 2004-07-22 CVE Published
  • 2024-08-08 CVE Updated
  • 2025-06-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Samba
Search vendor "Samba"
Samba
Search vendor "Samba" for product "Samba"
>= 2.2.0 < 2.2.10
Search vendor "Samba" for product "Samba" and version " >= 2.2.0 < 2.2.10"
-
Affected
Samba
Search vendor "Samba"
Samba
Search vendor "Samba" for product "Samba"
>= 3.0.0 < 3.0.5
Search vendor "Samba" for product "Samba" and version " >= 3.0.0 < 3.0.5"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
1.5
Search vendor "Trustix" for product "Secure Linux" and version "1.5"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
2.0
Search vendor "Trustix" for product "Secure Linux" and version "2.0"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
2.1
Search vendor "Trustix" for product "Secure Linux" and version "2.1"
-
Affected