First published: Sat Oct 16 2004(Updated: )
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =2.2.0 | |
Samba | =2.2.0a | |
Samba | =2.2.1a | |
Samba | =2.2.2 | |
Samba | =2.2.3 | |
Samba | =2.2.3a | |
Samba | =2.2.4 | |
Samba | =2.2.5 | |
Samba | =2.2.6 | |
Samba | =2.2.7 | |
Samba | =2.2.7a | |
Samba | =2.2.8 | |
Samba | =2.2.8a | |
Samba | =2.2.9 | |
Samba | =2.2.11 | |
Samba | =2.2a | |
Samba | =3.0.0 | |
Samba | =3.0.1 | |
Samba | =3.0.2 | |
Samba | =3.0.2a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0815 has a moderate severity rating due to potential unauthorized access to file systems.
To fix CVE-2004-0815, upgrade Samba to version 3.0.2a or later.
Samba versions 2.2.x through 2.2.11 and 3.0.x before 3.0.2a are affected by CVE-2004-0815.
CVE-2004-0815 allows remote attackers to bypass share restrictions and access arbitrary files.
Yes, CVE-2004-0815 can be exploited remotely through specially crafted directory names.