Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0815 | First vendor Publication | 2004-11-03 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for CIFS Samba Server HPSBUX01086 File : nvt/gb_hp_ux_HPSBUX01086.nasl |
2008-09-04 | Name : FreeBSD Ports: samba File : nvt/freebsd_samba2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 600-1 (samba) File : nvt/deb_600_1.nasl |
2005-11-03 | Name : Samba Remote Arbitrary File Access File : nvt/samba_arbitrary_file_access.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10990 | HP CIFS Server Arbitrary File Access The HP CIFS Server contains a flaw that allows a remote attacker to read or write files outside of the shared directory path. The issue is due to the program not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "unix_convert()" and "check_name()" variables when converting DOS path names to filenames which are valid on the server filesystem. |
10464 | Samba MS-DOS Path Request Arbitrary File Retrieval Samba contains a flaw that allows a remote attacker to gain access to files outside of the share path under the privileges of the user. With a specifically crafted request, an attacker could potentially access files outside the share's root. The issue is due to the unix_convert() and check_name() functions not properly sanitizing user input supplied via the GET, PUT and DIR commands. Samba treats the resulting input as an absolute path rather than relative path to the share. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Samba arbitrary file access exploit attempt RuleID : 15983 - Revision : 8 - Type : SERVER-SAMBA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_de16b056132e11d9bc4a000c41e2cdad.nasl - Type : ACT_GATHER_INFO |
2004-11-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-600.nasl - Type : ACT_GATHER_INFO |
2004-10-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-498.nasl - Type : ACT_GATHER_INFO |
2004-10-05 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2004_035.nasl - Type : ACT_GATHER_INFO |
2004-10-02 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-104.nasl - Type : ACT_GATHER_INFO |
2004-09-30 | Name : The remote file server allows access to arbitrary files. File : samba_arbitrary_file_access.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:53 |
|
2024-11-28 12:06:12 |
|
2024-08-02 12:02:51 |
|
2024-08-02 01:01:31 |
|
2024-02-02 01:02:37 |
|
2024-02-01 12:01:33 |
|
2023-09-05 12:02:29 |
|
2023-09-05 01:01:24 |
|
2023-09-02 12:02:31 |
|
2023-09-02 01:01:24 |
|
2023-08-12 12:03:02 |
|
2023-08-12 01:01:25 |
|
2023-08-11 12:02:37 |
|
2023-08-11 01:01:26 |
|
2023-08-06 12:02:25 |
|
2023-08-06 01:01:25 |
|
2023-08-04 12:02:29 |
|
2023-08-04 01:01:26 |
|
2023-07-14 12:02:27 |
|
2023-07-14 01:01:26 |
|
2023-03-29 01:02:29 |
|
2023-03-28 12:01:31 |
|
2022-10-11 12:02:11 |
|
2022-10-11 01:01:18 |
|
2021-05-04 12:02:24 |
|
2021-04-22 01:02:33 |
|
2020-05-23 00:15:53 |
|
2018-10-31 00:19:43 |
|
2017-07-11 12:01:30 |
|
2016-10-18 12:01:22 |
|
2016-06-28 15:06:15 |
|
2014-02-17 10:28:00 |
|
2014-01-19 21:22:17 |
|
2013-05-11 11:43:05 |
|