CVE-2004-0807

Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=109509335230495&w=2
http://marc.info/?l=bugtraq&m=109526231623307&w=2
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml Patch Vendor Advisory
http://www.idefense.com/application/poi/display?id=139&type=vulnerabilities Patch Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
http://www.redhat.com/support/errata/RHSA-2004-467.html Patch Vendor Advisory
http://www.trustix.net/errata/2004/0046/ Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141
ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=109509335230495&w=2
http://marc.info/?l=bugtraq&m=109526231623307&w=2
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml Patch Vendor Advisory
http://www.idefense.com/application/poi/display?id=139&type=vulnerabilities Patch Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
http://www.redhat.com/support/errata/RHSA-2004-467.html Patch Vendor Advisory
http://www.trustix.net/errata/2004/0046/ Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.1:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.2:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.3:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.4:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.5:*:irix:*:*:*:*:*
cpe:2.3:a:sgi:samba:3.0.6:*:irix:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 - Patch, Vendor Advisory () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=109509335230495&w=2 - () http://marc.info/?l=bugtraq&m=109509335230495&w=2 -
References () http://marc.info/?l=bugtraq&m=109526231623307&w=2 - () http://marc.info/?l=bugtraq&m=109526231623307&w=2 -
References () http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml - Patch, Vendor Advisory
References () http://www.idefense.com/application/poi/display?id=139&type=vulnerabilities - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=139&type=vulnerabilities - Patch, Vendor Advisory
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092 - () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092 -
References () http://www.redhat.com/support/errata/RHSA-2004-467.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-467.html - Patch, Vendor Advisory
References () http://www.trustix.net/errata/2004/0046/ - Patch, Vendor Advisory () http://www.trustix.net/errata/2004/0046/ - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141 -

Information

Published : 2004-09-13 04:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0807

Mitre link : CVE-2004-0807

CVE.ORG link : CVE-2004-0807


JSON object : View

Products Affected

mandrakesoft

  • mandrake_linux

samba

  • samba

sgi

  • samba

suse

  • suse_linux

conectiva

  • linux