Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-0686

Опубликовано: 27 июл. 2004
Источник: debian
EPSS Средний

Описание

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed3.0.5package

EPSS

Процентиль: 94%
0.15252
Средний

Связанные уязвимости

redhat
около 21 года назад

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

nvd
около 21 года назад

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

github
больше 3 лет назад

Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.

EPSS

Процентиль: 94%
0.15252
Средний