10
CVSSv2

CVE-2004-0600

Published: 27/07/2004 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote malicious users to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 3.0.2

samba samba 3.0.2a

samba samba 3.0.3

samba samba 3.0.4

trustix secure linux 2.0

trustix secure linux 2.1

trustix secure linux 1.5

Vendor Advisories

Synopsis samba security update Type/Severity Security Advisory: Important Topic Updated samba packages that fix buffer overflows, as well as other variousbugs, are now available Description Samba provides file and printer sharing services to SMB/CIFS clients Evgeny Demidov discovered a f ...

Exploits

#!/usr/bin/perl # Samba 304 and prior's SWAT Authorization Buffer Overflow # Created by Noam Rathaus of Beyond Security Ltd # use IO::Socket; use strict; my $host = $ARGV[0]; my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, PeerPort => "901" ); unless ($remote) { die "cannot connect to http daemon on $host ...