ID CVE-2004-1154
Summary Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
    cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
    cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-04-29T04:03:51.464-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
    family unix
    id oval:org.mitre.oval:def:10236
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title on crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
    version 29
  • accepted 2006-03-09T12:19:00.000-04:00
    class vulnerability
    contributors
    name Robert L. Hollis
    organization ThreatGuard, Inc.
    description Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
    family unix
    id oval:org.mitre.oval:def:1459
    status accepted
    submitted 2006-01-13T02:24:00.000-04:00
    title HP-Samba DACL Remote Integer Overflow Vulnerability (CIFS A.01)
    version 36
  • accepted 2010-09-20T04:00:33.713-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    description Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
    family unix
    id oval:org.mitre.oval:def:642
    status accepted
    submitted 2006-01-13T02:24:00.000-04:00
    title HP-Samba DACL Remote Integer Overflow Vulnerability (CIFS A.02)
    version 37
redhat via4
advisories
rhsa
id RHSA-2005:020
rpms
  • samba-0:3.0.9-1.3E.1
  • samba-client-0:3.0.9-1.3E.1
  • samba-common-0:3.0.9-1.3E.1
  • samba-debuginfo-0:3.0.9-1.3E.1
  • samba-swat-0:3.0.9-1.3E.1
refmap via4
apple APPLE-SA-2005-03-21
bid 11973
cert-vn VU#226184
confirm http://www.samba.org/samba/security/CAN-2004-1154.html
debian DSA-701
idefense 20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability
sco SCOSA-2005.17
secunia 13453
sunalert
  • 101643
  • 57730
suse SUSE-SA:2004:045
xf samba-msrpc-heap-corruption(18519)
Last major update 30-10-2018 - 16:25
Published 10-01-2005 - 05:00
Last modified 30-10-2018 - 16:25
Back to Top