VID |
23222 |
Severity |
40 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
A version of Samba server which is older than 3.3.12 / 3.4.7 / 3.5.1 is security bypass vulnerability. because of a flaw that causes all smbd processes, when libcap support is enabled, to inherit 'CAP_DAC_OVERRIDE' capabilities, which in turn causes all file system access to be allowed even when permissions should have been denied.
A remote, authenticated attacker may be able to exploit this flaw to gain access to sensitive information on Samba shares that are accessible to their user id.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: http://us1.samba.org/samba/security/CVE-2010-0728.html https://bugzilla.samba.org/show_bug.cgi?id=7222 http://www.samba.org/samba/security/
* Platforms Affected: Samba Project, Samba versions prior to 3.3.12 / 3.4.7 / 3.5.1 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba (3.3.12 / 3.4.7 / 3.5.1 or later), available from the Samba Web site at http://us1.samba.org/samba/ |
Related URL |
CVE-2010-0728 (CVE) |
Related URL |
38606 (SecurityFocus) |
Related URL |
(ISS) |
|