Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43566

Опубликовано: 11 янв. 2022
Источник: debian

Описание

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.16.0+dfsg-1experimentalpackage
sambafixed2:4.16.0+dfsg-2package
sambafixed2:4.13.13+dfsg-1~deb11u4bullseyepackage
sambaignoredbusterpackage

Примечания

  • https://www.samba.org/samba/security/CVE-2021-43566.html

  • https://bugzilla.samba.org/show_bug.cgi?id=13979

Связанные уязвимости

CVSS3: 2.5
ubuntu
около 4 лет назад

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

CVSS3: 2.6
redhat
около 4 лет назад

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

CVSS3: 2.5
nvd
около 4 лет назад

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

CVSS3: 2.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 2.5
github
около 4 лет назад

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.