Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-6150

Опубликовано: 12 июн. 2012
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sambaNot affected
Red Hat Enterprise Linux 7sambaNot affected
Red Hat Enterprise Linux 5samba3xFixedRHSA-2014:033025.03.2014
Red Hat Enterprise Linux 6sambaFixedRHSA-2014:033025.03.2014
Red Hat Enterprise Linux 6samba4FixedRHSA-2014:038309.04.2014

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1036897samba: pam_winbind fails open when non-existent group specified to require_membership_of

EPSS

Процентиль: 50%
0.00268
Низкий

2.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

nvd
больше 11 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

debian
больше 11 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winb ...

github
около 3 лет назад

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

CVSS3: 4.4
fstec
больше 11 лет назад

Уязвимость программного обеспечения Samba, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 50%
0.00268
Низкий

2.9 Low

CVSS2