Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0926

Опубликовано: 10 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 3.5

Описание

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.11
devel

not-affected

2:3.4.6~dfsg-1ubuntu2
hardy

released

3.0.28a-1ubuntu4.11
intrepid

released

2:3.2.3-1ubuntu3.8
jaunty

released

2:3.3.2-1ubuntu3.4
karmic

released

2:3.4.0-3ubuntu5.6
upstream

released

3.4.6

Показывать по

EPSS

Процентиль: 96%
0.29358
Средний

3.5 Low

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

nvd
почти 16 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

debian
почти 16 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before ...

github
почти 4 года назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

oracle-oval
почти 14 лет назад

ELSA-2012-0313: samba security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 96%
0.29358
Средний

3.5 Low

CVSS2