Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63421
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDVSA-2009:042 (samba)
Resumen:The remote host is missing an update to samba;announced via advisory MDVSA-2009:042.
Descripción:Summary:
The remote host is missing an update to samba
announced via advisory MDVSA-2009:042.

Vulnerability Insight:
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows
remote authenticated users to access the root filesystem via a crafted
connection request that specifies a blank share name (CVE-2009-0022).

This update provides samba 3.2.7 to address this issue.

Affected: 2009.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
6.3

CVSS Vector:
AV:N/AC:M/Au:S/C:C/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-0022
1021513
http://www.securitytracker.com/id?1021513
33118
http://www.securityfocus.com/bid/33118
33379
http://secunia.com/advisories/33379
33392
http://secunia.com/advisories/33392
33431
http://secunia.com/advisories/33431
51152
http://osvdb.org/51152
ADV-2009-0017
http://www.vupen.com/english/advisories/2009/0017
FEDORA-2009-0268
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
MDVSA-2009:042
http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
USN-702-1
https://usn.ubuntu.com/702-1/
http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
http://www.samba.org/samba/security/CVE-2009-0022.html
samba-file-system-security-bypass(47733)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.