10
CVSSv2

CVE-2004-0882

Published: 27/01/2005 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x up to and including 3.0.7 may allow remote malicious users to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 3.0.0

samba samba 3.0.5

samba samba 3.0.6

samba samba 3.0.2a

samba samba 3.0.3

samba samba 3.0.1

samba samba 3.0.2

samba samba 3.0.7

conectiva linux 10.0

samba samba 3.0.4

redhat enterprise linux 2.1

redhat fedora core core_3.0

redhat linux advanced workstation 2.1

redhat enterprise linux 3.0

ubuntu ubuntu linux 4.1

redhat enterprise linux desktop 3.0

redhat fedora core core_2.0

Vendor Advisories

Synopsis samba security update Type/Severity Security Advisory: Important Topic Updated samba packages that fix various security vulnerabilities are nowavailable Description Samba provides file and printer sharing services to SMB/CIFS clientsDuring a code audit, Stefan Esser discovered a ...
During an audit of the Samba 3x code base Stefan Esser discovered a Unicode file name buffer overflow within the handling of TRANSACT2_QFILEPATHINFO replies A malicious samba user with write access to a share could exploit this by creating specially crafted path names (files with very long names containing Unicode characters) that would overflow ...