Vulnerabilities
Vulnerable Software
Samba:  >> Samba  >> 3.0.4  Security Vulnerabilities
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
CVSS Score
10.0
EPSS Score
0.278
Published
2005-01-10
Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).
CVSS Score
6.4
EPSS Score
0.007
Published
2004-12-31
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
CVSS Score
5.0
EPSS Score
0.079
Published
2004-12-31
Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
CVSS Score
5.0
EPSS Score
0.098
Published
2004-09-13
Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
CVSS Score
10.0
EPSS Score
0.596
Published
2004-07-27
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
CVSS Score
5.0
EPSS Score
0.128
Published
2004-07-27


Contact Us

Shodan ® - All rights reserved