7.5
CVSSv2

CVE-2004-0815

Published: 03/11/2004 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The unix_clean_name function in Samba 2.2.x up to and including 2.2.11, and 3.0.x prior to 3.0.2a, trims certain directory names down to absolute paths, which could allow remote malicious users to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 2.2.0

samba samba 2.2.5

samba samba 2.2.6

samba samba 3.0.0

samba samba 2.2.0a

samba samba 2.2.11

samba samba 2.2.1a

samba samba 2.2.7

samba samba 2.2.7a

samba samba 3.0.1

samba samba 3.0.2

samba samba 2.2.2

samba samba 2.2.3

samba samba 2.2.8

samba samba 2.2.8a

samba samba 3.0.2a

samba samba 2.2.3a

samba samba 2.2.4

samba samba 2.2.9

samba samba 2.2a

Vendor Advisories

Synopsis samba security update Type/Severity Security Advisory: Important Topic Updated samba packages that fix an input validation vulnerability are nowavailable Description Samba provides file and printer sharing services to SMB/CIFS clientsKarol Wiesek discovered an input validation is ...
A vulnerability has been discovered in samba, a commonly used LanManager-like file and printer server for Unix A remote attacker may be able to gain access to files which exist outside of the share's defined path Such files must still be readable by the account used for the connection, though For the stable distribution (woody) this problem has ...