First published: Wed Oct 26 2022(Updated: )
A symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make 'smbd' escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the 'smbd' configured share path and gain access to another restricted server's filesystem.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.17.0<4.17.2 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
redhat/samba | <4.17.2 | 4.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3592 is a symlink following vulnerability found in Samba, allowing a user to create symbolic links that can make 'smbd' escape the configured share path.
CVE-2022-3592 has a severity rating of 6.5, which is considered medium.
CVE-2022-3592 allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks.
Versions up to and excluding 4.17.2 of Samba are affected by CVE-2022-3592.
You can find more information about CVE-2022-3592 at the following references: [samba.org](https://www.samba.org/samba/security/CVE-2022-3592.html), [bugzilla.redhat.com](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2137778), [bugzilla.redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=2137776).