First published: Thu Nov 19 1998(Updated: )
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =1.9.18 | |
SCO OpenLinux Server | =1.0 | |
SCO OpenLinux Server | =1.1 | |
SCO OpenLinux Server | =1.2 | |
SCO OpenLinux Server | =1.3 | |
Red Hat Linux | ||
Turbolinux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1288 has a high severity due to the potential for local users to exploit incorrect file permissions and gain elevated privileges.
To fix CVE-1999-1288, you should remove the setgid bit from the wsmbconf application and ensure proper file permissions.
CVE-1999-1288 specifically affects Samba version 1.9.18.
No, CVE-1999-1288 can only be exploited by local users on systems where the vulnerable version of Samba is installed.
CVE-1999-1288 affects several versions of SCO OpenLinux, Red Hat Linux, and Turbolinux that include Samba 1.9.18.