First published: Mon Mar 15 2004(Updated: )
smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =2.0 | |
Samba | =3.0.0 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0-test1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.6.0-test3 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0-test5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.6.0-test7 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6_test9_cvs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0186 has a high severity rating as it allows local users to gain root privileges on the system.
To fix CVE-2004-0186, ensure that the 'smbmnt' program is not setuid or update to a patched version of Samba.
CVE-2004-0186 affects Samba 2.x and 3.0.0 versions when running on Linux kernel 2.6.
No, CVE-2004-0186 can only be exploited locally by users who can mount Samba shares.
CVE-2004-0186 impacts Linux kernel versions 2.6.0 and its test versions.