Executive Summary
Summary | |
---|---|
Title | Samba vulnerability |
Informations | |||
---|---|---|---|
Name | USN-702-1 | First vendor Publication | 2009-01-05 |
Vendor | Ubuntu | Last vendor Modification | 2009-01-05 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 6.3 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.10: In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Gunter Höckel discovered that Samba with registry shares enabled did not properly validate share names. An authenticated user could gain access to the root filesystem by using an older version of smbclient and specifying an empty string as a share name. This is only an issue if registry shares are enabled on the server by setting "registry shares = yes", "include = registry", or "config backend = registry", which is not the default. |
Original Source
Url : http://www.ubuntu.com/usn/USN-702-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13986 | |||
Oval ID: | oval:org.mitre.oval:def:13986 | ||
Title: | USN-702-1 -- samba vulnerability | ||
Description: | Gunter Höckel discovered that Samba with registry shares enabled did not properly validate share names. An authenticated user could gain access to the root filesystem by using an older version of smbclient and specifying an empty string as a share name. This is only an issue if registry shares are enabled on the server by setting "registry shares = yes", "include = registry", or "config backend = registry", which is not the default. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-702-1 CVE-2009-0022 | Version: | 5 |
Platform(s): | Ubuntu 8.10 | Product(s): | samba |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 7 |
OpenVAS Exploits
Date | Description |
---|---|
2009-10-06 | Name : Fedora Core 10 FEDORA-2009-10172 (samba) File : nvt/fcore_2009_10172.nasl |
2009-06-05 | Name : Ubuntu USN-698-3 (nagios2) File : nvt/ubuntu_698_3.nasl |
2009-02-23 | Name : Mandrake Security Advisory MDVSA-2009:042 (samba) File : nvt/mdksa_2009_042.nasl |
2009-01-20 | Name : SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 11.1) File : nvt/suse_sr_2009_001.nasl |
2009-01-20 | Name : SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 11.0) File : nvt/suse_sr_2009_001a.nasl |
2009-01-20 | Name : SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 10.3) File : nvt/suse_sr_2009_001b.nasl |
2009-01-13 | Name : Fedora Core 9 FEDORA-2009-0268 (samba) File : nvt/fcore_2009_0268.nasl |
2009-01-09 | Name : Samba Root File System Access Security Vulnerability File : nvt/gb_samba_root_file_sys_sec_vuln.nasl |
2009-01-07 | Name : Fedora Core 10 FEDORA-2009-0160 (samba) File : nvt/fcore_2009_0160.nasl |
2009-01-07 | Name : Ubuntu USN-702-1 (samba) File : nvt/ubuntu_702_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-005-01 samba File : nvt/esoft_slk_ssa_2009_005_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
51152 | Samba Crafted Connection Request Remote Root File System Access |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Samba Root File System access bypass attempt RuleID : 17639 - Revision : 9 - Type : SERVER-SAMBA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_cifs-mount-090108.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_cifs-mount-090108.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-0160.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-042.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-702-1.nasl - Type : ACT_GATHER_INFO |
2009-01-16 | Name : The remote Fedora host is missing a security update. File : fedora_2009-0268.nasl - Type : ACT_GATHER_INFO |
2009-01-06 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-005-01.nasl - Type : ACT_GATHER_INFO |
2009-01-06 | Name : The remote Samba server may be affected by an unauthorized access vulnerability. File : samba_3_2_7.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:05:36 |
|