Vulnerabilities > Samba > Samba > 3.0.4

DATE CVE VULNERABILITY TITLE RISK
2007-11-16 CVE-2007-4572 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Samba
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
network
samba CWE-119
critical
9.3
2007-05-14 CVE-2007-2447 Remote Shell Command Execution vulnerability in Samba MS-RPC
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
network
samba
6.0
2006-07-12 CVE-2006-3403 Denial of Service vulnerability in Samba Internal Data Structures
The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
network
low complexity
samba
5.0
2005-01-27 CVE-2004-0930 Remote Wild Card Denial Of Service vulnerability in Samba
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
network
low complexity
samba sgi conectiva gentoo redhat
5.0
2005-01-27 CVE-2004-0882 Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
network
low complexity
samba conectiva redhat ubuntu
critical
10.0
2005-01-10 CVE-2004-1154 Remote Integer Overflow vulnerability in Samba Directory Access Control List
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
network
low complexity
samba redhat suse trustix
critical
10.0
2004-12-31 CVE-2004-2546 Denial-Of-Service vulnerability in Samba
Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).
network
low complexity
samba trustix
6.4
2004-12-31 CVE-2004-0808 Unspecified vulnerability in Samba
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
network
low complexity
samba
5.0
2004-09-13 CVE-2004-0807 Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
network
low complexity
samba sgi conectiva mandrakesoft suse
5.0
2004-07-27 CVE-2004-0686 Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
network
low complexity
samba trustix
5.0