Samba provides file and printer sharing services to SMB/CIFS clients.
The Samba team discovered a buffer overflow in the code used to support
the ‘mangling method = hash’ smb.conf option. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0686
to this issue.
All users of Samba should upgrade to these updated packages, which
contain an upgrade to Samba-2.2.10, which is not vulnerable to this
issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | any | i386 | samba-client | < 2.2.10-1.21as.1 | samba-client-2.2.10-1.21as.1.i386.rpm |
RedHat | any | i386 | samba-swat | < 2.2.10-1.21as.1 | samba-swat-2.2.10-1.21as.1.i386.rpm |
RedHat | any | ia64 | samba-client | < 2.2.10-1.21as.1 | samba-client-2.2.10-1.21as.1.ia64.rpm |
RedHat | any | i386 | samba | < 2.2.10-1.21as.1 | samba-2.2.10-1.21as.1.i386.rpm |
RedHat | any | ia64 | samba-common | < 2.2.10-1.21as.1 | samba-common-2.2.10-1.21as.1.ia64.rpm |
RedHat | any | i386 | samba-common | < 2.2.10-1.21as.1 | samba-common-2.2.10-1.21as.1.i386.rpm |
RedHat | any | ia64 | samba-swat | < 2.2.10-1.21as.1 | samba-swat-2.2.10-1.21as.1.ia64.rpm |
RedHat | any | ia64 | samba | < 2.2.10-1.21as.1 | samba-2.2.10-1.21as.1.ia64.rpm |