Search for vulnerabilities
Vulnerability details: VCID-gvvb-ekdv-aaac
Vulnerability ID VCID-gvvb-ekdv-aaac
Aliases CVE-2004-0808
Summary The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2004:467
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.04254 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.05055 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.05055 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.05055 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.05055 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.07869 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
epss 0.08912 https://api.first.org/data/v1/epss?cve=CVE-2004-0808
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1617298
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2004-0808
Reference id Reference type URL
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873
http://marc.info/?l=bugtraq&m=109509335230495&w=2
http://marc.info/?l=bugtraq&m=109526231623307&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0808.json
https://api.first.org/data/v1/epss?cve=CVE-2004-0808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0808
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml
http://www.idefense.com/application/poi/display?id=138&type=vulnerabilities
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
http://www.redhat.com/support/errata/RHSA-2004-467.html
http://www.trustix.net/errata/2004/0046/
1617298 https://bugzilla.redhat.com/show_bug.cgi?id=1617298
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
CVE-2004-0808 https://nvd.nist.gov/vuln/detail/CVE-2004-0808
RHSA-2004:467 https://access.redhat.com/errata/RHSA-2004:467
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2004-0808
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92481
EPSS Score 0.04254
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.