VID |
23265 |
Severity |
20 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
The version of Samba running on the remote host is 4.4.x prior to 4.4.12, 4.5.x prior to 4.5.7, or 4.6.x prior to 4.6.1. It is, therefore, affected by an information disclosure vulnerability due to a race condition between calls to lstat() for symlink checks and calls to open() to read a file. A local attacker can exploit this, by replacing a recently checked path with a symlink, to disclose arbitrary files on the system.
* References: https://www.samba.org/samba/security/CVE-2017-2619.html https://www.samba.org/samba/history/samba-4.4.12.html https://www.samba.org/samba/history/samba-4.5.7.html https://www.samba.org/samba/history/samba-4.6.1.html"
* Platforms Affected: Samba Project, Samba versions 4.6.x before 4.6.1 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba 4.6.1 or later, available from the Samba Web site at https://www.samba.org/samba/download/ |
Related URL |
CVE-2017-2619 (CVE) |
Related URL |
97033 (SecurityFocus) |
Related URL |
(ISS) |
|