Korean
<< Back
VID 23091
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description The Samba server, according to its version number, an arbitrary file access vulnerability.
Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions 2.2.x through 2.2.11 and 3.0.x through 3.0.5 could allow a remote attacker to gain unauthorized access to files which exist outside of the share's defined path. This issue is due to a failure of the application to properly validate user-supplied file names. An attacker needs a valid account to exploit this flaw.

* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.

* References:
http://us1.samba.org/samba/news/#security_2.2.12

* Platforms Affected:
Samba 2.2.x through 2.2.11
Samba 3.0.x through 3.0.5
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of samba (3.0.7 or 2.2.12 or later), available from the Samba Web site at http://samba.org/samba/samba.html

For SuSE Linux:
Upgrade to the latest samba package, as listed in SuSE Security Announcement SUSE-SA:2004:035 at http://www.linuxsecurity.com/advisories/suse_advisory-4907.html

For Trustix Secure Linux:
Upgrade to the latest samba package, as listed in Trustix Secure Linux Security Advisory #2004-0051 at http://www.linuxsecurity.com/advisories/trustix_advisory-4884.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0815 (CVE)
Related URL 11281 (SecurityFocus)
Related URL 17556 (ISS)