CVE-2004-1154 (CNNVD-200501-111)

CRITICAL
中文标题:
Samba smbd 整数溢出漏洞
英文标题:
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authe...
CVSS分数: 10.0
发布时间: 2004-12-22 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Samba是一套开源的实现SMB(Server Messages Block)协议,跨平台进行文件共享和打印共享服务的程序。 Samba2.x及3.0.x至3.0.9系列版本中的守候进程smbd存在整数溢出漏洞。 远程攻击者这可通过使用超大的安全描述符触发溢出,导致程序崩溃或执行任意代码。

英文描述:

Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
samba samba 2.0.0 - - cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
samba samba 2.0.1 - - cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
samba samba 2.0.2 - - cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
samba samba 2.0.3 - - cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
samba samba 2.0.4 - - cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
samba samba 2.0.5 - - cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
samba samba 2.0.6 - - cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
samba samba 2.0.7 - - cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
samba samba 2.0.8 - - cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
samba samba 2.0.9 - - cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
samba samba 2.0.10 - - cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
samba samba 2.2.0 - - cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
samba samba 2.2.0a - - cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
samba samba 2.2.1a - - cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
samba samba 2.2.2 - - cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
samba samba 2.2.3 - - cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
samba samba 2.2.3a - - cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
samba samba 2.2.4 - - cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
samba samba 2.2.5 - - cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
samba samba 2.2.6 - - cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
samba samba 2.2.7 - - cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
samba samba 2.2.7a - - cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
samba samba 2.2.8 - - cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
samba samba 2.2.8a - - cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
samba samba 2.2.9 - - cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
samba samba 2.2.11 - - cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
samba samba 2.2.12 - - cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
samba samba 2.2a - - cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
samba samba 3.0.0 - - cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
samba samba 3.0.1 - - cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
samba samba 3.0.2 - - cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
samba samba 3.0.2a - - cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
samba samba 3.0.3 - - cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
samba samba 3.0.4 - - cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
samba samba 3.0.5 - - cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
samba samba 3.0.6 - - cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
samba samba 3.0.7 - - cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
samba samba 3.0.8 - - cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
samba samba 3.0.9 - - cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
redhat fedora_core core_2.0 - - cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
redhat fedora_core core_3.0 - - cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
suse suse_linux 1.0 - - cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
suse suse_linux 8.1 - - cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
suse suse_linux 8.2 - - cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
suse suse_linux 9.0 - - cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
suse suse_linux 9.1 - - cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
suse suse_linux 9.2 - - cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
trustix secure_linux 2.0 - - cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
trustix secure_linux 2.1 - - cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
trustix secure_linux 2.2 - - cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
101643 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:10236 vdb-entry
cve.org
访问
11973 vdb-entry
cve.org
访问
samba-msrpc-heap-corruption(18519) vdb-entry
cve.org
访问
RHSA-2005:020 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:642 vdb-entry
cve.org
访问
13453 third-party-advisory
cve.org
访问
DSA-701 vendor-advisory
cve.org
访问
APPLE-SA-2005-03-21 vendor-advisory
cve.org
访问
57730 vendor-advisory
cve.org
访问
20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability third-party-advisory
cve.org
访问
SUSE-SA:2004:045 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:1459 vdb-entry
cve.org
访问
SCOSA-2005.17 vendor-advisory
cve.org
访问
VU#226184 third-party-advisory
cve.org
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2004-12-22 05:00:00
修改时间:
2024-08-08 00:39:00
创建时间:
2025-11-11 15:32:22
更新时间:
2025-11-11 15:48:56
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-1154 2025-11-11 15:17:30 2025-11-11 07:32:22
NVD nvd_CVE-2004-1154 2025-11-11 14:50:56 2025-11-11 07:41:08
CNNVD cnnvd_CNNVD-200501-111 2025-11-11 15:08:45 2025-11-11 07:48:56
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:56
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200501-111; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200501-111
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:08
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 50; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 50
  • data_sources: ['cve'] -> ['cve', 'nvd']