Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2004-0808
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Samba多个ASN.1和MailSlot解析模块远程拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Samba是一套实现SMB(Server Messages Block)协议,跨平台进行文件共享和打印共享服务的程序。 smbd对多个畸形请求缺少正确处理,远程攻击者可以利用这个漏洞使服务程序消耗大量资源,进行拒绝服务攻击。 未授权攻击者可以发送畸形请求,每个请求派生一个新进程,每个新进程进入无限循环,可导致服务程序崩溃。此类攻击只需要少量带宽,每个请求只需358字节,超过4000个请求可导致512M RAM、512SWAP的RedHat Fedora Core 1机器崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2004-0808
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2004-0808
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2004-0808

No comments yet


Leave a comment