Описание
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-0022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
- https://usn.ubuntu.com/702-1
- https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
- http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
- http://osvdb.org/51152
- http://secunia.com/advisories/33379
- http://secunia.com/advisories/33392
- http://secunia.com/advisories/33431
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
- http://www.samba.org/samba/security/CVE-2009-0022.html
- http://www.securityfocus.com/bid/33118
- http://www.securitytracker.com/id?1021513
- http://www.vupen.com/english/advisories/2009/0017
Связанные уязвимости
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows re ...