Korean
<< Back
VID 21234
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SMB2WWW allows a remote attacker to execute arbitrary command on the system.
SMB2WWW is a Windows Network client that is accessible through a web browser for Solaris and Linux if the Samba, Perl and a web server are supported. Some versions of SMB2WWW have a flaw that allows a remote attacker to execute arbitrary commands on the system. This vulnerability aries when a remote attacker sends a malformed argument to smbshr.pl of the SMB2WWW component as the following:

POST /cgi-bin/smbshr.pl HTTP/1.1
Host: X.X.X.X
...
Content-Length: XX

host=%22%20%2DFOOBAR%7Cecho%20%22%20Sharename%22%0Aecho%0Aecho%20%22%20%20SomeShare%20%20Disk%20%22%60id%60%20%23%22

Such request can lead a remote attacker to execute arbitrary programs under "www-data" user privileges on the system.

* References:
http://www.securityfocus.com/advisories/4741
http://www.linuxsecurity.com/advisories/debian_advisory-2636.html

* Platforms Affected:
SMB2WWW 980804-16 and prior
Debian Linux 2.2
Debian Linux 3.0
Recommendation Upgrade to the latest SMB2WWW package immediately

For Debian 2.2 (potato),
[source]
http://security.debian.org/pool/updates/main/s/smb2www/smb2www_980804.orig.tar.gz
[architecture-independent component] http://security.debian.org/pool/updates/main/s/smb2www/smb2www_980804-9.1_all.deb

For Debian 3.0 (woody),
[source]
http://security.debian.org/pool/updates/main/s/smb2www/smb2www_980804.orig.tar.gz
[architecture-independent component] http://security.debian.org/pool/updates/main/s/smb2www/smb2www_980804-16.1_all.deb
Related URL CVE-2002-1342 (CVE)
Related URL 6313 (SecurityFocus)
Related URL 10768 (ISS)