Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2004-0815

Опубликовано: 30 сент. 2004
Источник: redhat

Описание

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

Дополнительная информация

Статус:

Important

Связанные уязвимости

nvd
больше 21 года назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

debian
больше 21 года назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x ...

github
почти 4 года назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.