Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-0808

Опубликовано: 31 дек. 2004
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 5

Описание

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

РелизСтатусПримечание
dapper

not-affected

devel

released

3.0.25b-1ubuntu4
edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 92%
0.07869
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 21 год назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

nvd
больше 20 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

debian
больше 20 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 a ...

github
около 3 лет назад

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

EPSS

Процентиль: 92%
0.07869
Низкий

5 Medium

CVSS2