Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0926

Опубликовано: 10 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 3.5

Описание

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

РелизСтатусПримечание
dapper

released

3.0.22-1ubuntu3.11
devel

not-affected

2:3.4.6~dfsg-1ubuntu2
hardy

released

3.0.28a-1ubuntu4.11
intrepid

released

2:3.2.3-1ubuntu3.8
jaunty

released

2:3.3.2-1ubuntu3.4
karmic

released

2:3.4.0-3ubuntu5.6
upstream

released

3.4.6

Показывать по

EPSS

Процентиль: 96%
0.27491
Средний

3.5 Low

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

nvd
больше 15 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

debian
больше 15 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before ...

github
больше 3 лет назад

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.

oracle-oval
больше 13 лет назад

ELSA-2012-0313: samba security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 96%
0.27491
Средний

3.5 Low

CVSS2