{ "id": "CVE-2009-0022", "sourceIdentifier": "secalert@redhat.com", "published": "2009-01-05T20:30:02.390", "lastModified": "2018-10-03T21:57:40.737", "vulnStatus": "Modified", "evaluatorSolution": "Patch Information - http://www.samba.org/samba/history/security.html", "descriptions": [ { "lang": "en", "value": "Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name." }, { "lang": "es", "value": "Samba v3.2.0 hasta v3.2.6, cuando el registro de acciones est\u00e1 habilitado, permite a usuarios autenticados remotamente acceder al sistema de ficheros ra\u00edz a trav\u00e9s de una petici\u00f3n de conexi\u00f3n manipulada que especifica un nombre de recurso compartido en blanco." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "lastModified": "2009-01-07T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7" } ] } ] } ], "references": [ { "url": "http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch", "source": "secalert@redhat.com" }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:042", "source": "secalert@redhat.com" }, { "url": "http://www.samba.org/samba/security/CVE-2009-0022.html", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/33118", "source": "secalert@redhat.com" }, { "url": "http://www.securitytracker.com/id?1021513", "source": "secalert@redhat.com" }, { "url": "http://www.vupen.com/english/advisories/2009/0017", "source": "secalert@redhat.com" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47733", "source": "secalert@redhat.com" }, { "url": "https://usn.ubuntu.com/702-1/", "source": "secalert@redhat.com" }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html", "source": "secalert@redhat.com" } ] }