Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA600] DSA-600-1 samba


Vulnerability Assessment Details

[DSA600] DSA-600-1 samba

Vulnerability Assessment Summary
DSA-600-1 samba

Detailed Explanation for this Vulnerability Assessment

A vulnerability has been discovered in samba, a commonly used
LanManager-like file and printer server for Unix. A remote attacker
may be able to gain access to files which exist outside of the share's
defined path. Such files must still be readable by the account used
for the connection, though.
For the stable distribution (woody) this problem has been fixed in
version 2.2.3a-14.1.
In the unstable (sid) and testing (sarge) distributions this problem
was not present.
We recommend that you upgrade your samba packages.


Solution : http://www.debian.org/security/2004/dsa-600
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

DELL Force10 S4810P-AC-R 48 10GbE SFP+ 4 40GbE QSFP Port Switch Single Power Sup
$2799.99
DELL Force10 S4810P-AC-R 48 10GbE SFP+ 4 40GbE QSFP Port Switch Single Power Sup pictureDell 330-2467 SFP+ Dual Port Module for Dell PowerConnect 6024 6224 6248 6424
$549.0
Dell 330-2467 SFP+ Dual Port Module for Dell PowerConnect 6024 6224 6248 6424 pictureOracle 530-4449-01 SFP+ Transceiver Module
$8.0
Oracle 530-4449-01 SFP+ Transceiver Module pictureLot of 9: Cisco (DS-SFP-FC-2G-SW) 10-1821-01 Transceiver Module
$7.0
Lot of 9: Cisco (DS-SFP-FC-2G-SW) 10-1821-01 Transceiver Module picture


Discussions

No Discussions have been posted on this vulnerability.