Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0022

Опубликовано: 05 янв. 2009
Источник: redhat
EPSS Низкий

Описание

Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.

Отчет

Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=479110samba: potential access to "/" in setups with registry shares enabled

EPSS

Процентиль: 89%
0.04433
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.

nvd
почти 17 лет назад

Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.

debian
почти 17 лет назад

Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows re ...

github
больше 3 лет назад

Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.

EPSS

Процентиль: 89%
0.04433
Низкий