ID CVE-2004-0082
Summary The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.
References
Vulnerable Configurations
  • cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2010-09-20T04:00:38.639-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Matt Busby
    organization The MITRE Corporation
  • name Thomas R. Jones
    organization Maitreya Security
  • name Jonathan Baker
    organization The MITRE Corporation
description The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.
family unix
id oval:org.mitre.oval:def:827
status accepted
submitted 2004-03-20T12:00:00.000-04:00
title Samba mksmboasswd Disabled Account Creation Vulnerability
version 41
redhat via4
advisories
rhsa
id RHSA-2004:064
rpms
  • samba-0:3.0.2-6.3E
  • samba-client-0:3.0.2-6.3E
  • samba-common-0:3.0.2-6.3E
  • samba-swat-0:3.0.2-6.3E
refmap via4
bid 9637
ciac O-078
confirm
osvdb 3919
xf samba-mksmbpasswd-gain-access(15132)
Last major update 30-10-2018 - 16:25
Published 03-03-2004 - 05:00
Last modified 30-10-2018 - 16:25
Back to Top