![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.145916 |
Kategorie: | Denial of Service |
Titel: | Samba 3.6.0 < 4.12.15, 4.13.0 < 4.13.8, 4.14.0 < 4.14.4 File Access Vulnerability |
Zusammenfassung: | Samba is prone to a unauthorized file access vulnerability. |
Beschreibung: | Summary: Samba is prone to a unauthorized file access vulnerability. Vulnerability Insight: The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. Most commonly this flaw causes the calling code to crash, but it was found that an unprivileged user may be able to delete a file within a network share that they should have been disallowed access to. Affected Software/OS: Samba version 3.6.0 and later. Solution: Update to version 4.12.15, 4.13.8, 4.14.4 or later. CVSS Score: 4.9 CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-20254 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/ https://security.gentoo.org/glsa/202105-22 https://security.netapp.com/advisory/ntap-20210430-0001/ https://bugzilla.redhat.com/show_bug.cgi?id=1949442 https://www.samba.org/samba/security/CVE-2021-20254.html https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |