CVE-2004-0808Improper Handling of Length Parameter Inconsistency in Samba

Severity
5.0MEDIUMNVD
EPSS
7.9%
top 7.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateApr 29

Description

The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/samba< samba 3.0.7 (bookworm)
Debiansamba/samba< 3.0.7+3
NVDsamba/samba8 versions+7

Patches

🔴Vulnerability Details

2
GHSA
GHSA-23gc-7p36-fm6g: The process_logon_packet function in the nmbd server for Samba 32022-04-29
OSV
CVE-2004-0808: The process_logon_packet function in the nmbd server for Samba 32004-12-31

📋Vendor Advisories

2
Red Hat
security flaw2004-09-13
Debian
CVE-2004-0808: samba - The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier...2004

📐Framework References

1
CWE
Improper Handling of Length Parameter Inconsistency

💬Community

1
Bugzilla
CVE-2004-0808 security flaw2018-08-16