Vulnerability Details : CVE-2010-0926
Public exploit exists!
The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
Vulnerability category: Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2010-0926
Probability of exploitation activity in the next 30 days: 2.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-0926
-
Samba Symlink Directory Traversal
First seen: 2020-04-26auxiliary/admin/smb/samba_symlink_traversalThis module exploits a directory traversal flaw in the Samba CIFS server. To exploit this flaw, a writeable share must be specified. The newly created directory will link to the root filesystem. Authors: - kcope - hdm <x@hdm.io>
CVSS scores for CVE-2010-0926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2010-0926
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0926
-
http://marc.info/?l=samba-technical&m=126540277713815&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=oss-security&m=126540733320471&w=2
'Re: [oss-security] Samba symlink 0day flaw' - MARC
-
http://marc.info/?l=oss-security&m=126539592603079&w=2
'[oss-security] Samba symlink 0day flaw' - MARC
-
http://marc.info/?l=samba-technical&m=126549111204428&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540608318301&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540011609753&w=2
're: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540376915283&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=full-disclosure&m=126538598820903&w=2
'Re: [Full-disclosure] Samba Remote Zero-Day Exploit' - MARC
-
http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html
-
https://bugzilla.samba.org/show_bug.cgi?id=7104
-
http://marc.info/?l=samba-technical&m=126540477016522&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html
-
http://marc.info/?l=samba-technical&m=126540290614053&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540539117328&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
https://bugzilla.redhat.com/show_bug.cgi?id=562568
562568 – (CVE-2010-0926) CVE-2010-0926 samba: insecure "wide links" default
-
http://marc.info/?l=oss-security&m=126545363428745&w=2
'Re: [oss-security] Samba symlink 0day flaw' - MARC
-
http://marc.info/?l=samba-technical&m=126540248613395&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540695819735&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126539387432412&w=2
'Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126540475116511&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126547903723628&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://www.openwall.com/lists/oss-security/2010/03/05/3
oss-security - Re: Samba symlink 0day flaw
-
http://marc.info/?l=samba-technical&m=126540100511357&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=samba-technical&m=126555346721629&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://marc.info/?l=oss-security&m=126777580624790&w=2
'Re: [oss-security] Samba symlink 0day flaw' - MARC
-
http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html
-
http://www.samba.org/samba/news/symlink_attack.html
Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:014
-
http://gitweb.samba.org/?p=samba.git;a=commit;h=bd269443e311d96ef495a9db47d1b95eb83bb8f4
git.samba.org - samba.git/commit
-
http://www.openwall.com/lists/oss-security/2010/02/06/3
oss-security - Re: Samba symlink 0day flaw
-
http://marc.info/?l=oss-security&m=126540402215620&w=2
'Re: [oss-security] Samba symlink 0day flaw' - MARC
-
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:008
-
http://marc.info/?l=samba-technical&m=126548356728379&w=2
'Re: Claimed Zero Day exploit in Samba.' - MARC
-
http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
Help @ Rapid7
Products affected by CVE-2010-0926
- cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*