Search for vulnerabilities
Vulnerability details: VCID-y1ft-tmsw-aaaf
Vulnerability ID VCID-y1ft-tmsw-aaaf
Aliases CVE-2004-0600
Summary Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2004:259
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.59614 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.65247 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.95808 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.95808 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.95808 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.95808 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
epss 0.96109 https://api.first.org/data/v1/epss?cve=CVE-2004-0600
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1617238
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2004-0600
Reference id Reference type URL
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000851
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000854
http://marc.info/?l=bugtraq&m=109051340810458&w=2
http://marc.info/?l=bugtraq&m=109051533021376&w=2
http://marc.info/?l=bugtraq&m=109052647928375&w=2
http://marc.info/?l=bugtraq&m=109052891507263&w=2
http://marc.info/?l=bugtraq&m=109053195818351&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0600.json
https://api.first.org/data/v1/epss?cve=CVE-2004-0600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600
https://exchange.xforce.ibmcloud.com/vulnerabilities/16785
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11445
http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071
http://www.novell.com/linux/security/advisories/2004_22_samba.html
http://www.redhat.com/support/errata/RHSA-2004-259.html
http://www.trustix.org/errata/2004/0039/
1617238 https://bugzilla.redhat.com/show_bug.cgi?id=1617238
260838 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260838
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
CVE-2004-0600 https://nvd.nist.gov/vuln/detail/CVE-2004-0600
OSVDB-8190;CVE-2004-0600 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/364.pl
RHSA-2004:259 https://access.redhat.com/errata/RHSA-2004:259
Data source Exploit-DB
Date added July 21, 2004
Description Samba 3.0.4 - SWAT Authorisation Buffer Overflow
Ransomware campaign use Known
Source publication date July 22, 2004
Exploit type remote
Platform linux
Source update date Sept. 6, 2017
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2004-0600
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.98072
EPSS Score 0.59614
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.