First published: Fri Jul 23 2004(Updated: )
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=2.2.0<2.2.10 | |
Samba | >=3.0.0<3.0.5 | |
Trustix Secure Linux | =2.0 | |
Trustix Secure Linux | =1.5 | |
Trustix Secure Linux | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0686 is significant as it involves a buffer overflow that could lead to unknown impacts.
To mitigate CVE-2004-0686, disable the "mangling method = hash" option in smb.conf or upgrade to a patched version of Samba.
CVE-2004-0686 affects Samba versions 2.2.x to 2.2.9 and 3.0.0 to 3.0.4.
Yes, Trustix Secure Linux versions 1.5, 2.0, and 2.1 are affected by CVE-2004-0686.
The attack vectors for CVE-2004-0686 are currently unknown, but it is associated with the buffer overflow vulnerability.