smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/9619 | Exploit Patch Vendor Advisory |
http://www.debian.org/security/2004/dsa-463 | Patch Vendor Advisory |
http://www.osvdb.org/3916 | |
http://marc.info/?l=bugtraq&m=107657505718743&w=2 | |
http://marc.info/?l=bugtraq&m=107636290906296&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15131 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-03-14 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2004-0186
Mitre link : CVE-2004-0186
JSON object : View
CWE
Products Affected
linux
- linux_kernel
samba
- samba