CVE-2009-0022
Published Jan 5, 2009
Last updated 6 years ago
Overview
- Description
- Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.3
- Impact score
- 6.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF" }, { "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7" } ], "operator": "OR" } ] } ]