Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.63421
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2009:042 (samba)
Zusammenfassung:The remote host is missing an update to samba;announced via advisory MDVSA-2009:042.
Beschreibung:Summary:
The remote host is missing an update to samba
announced via advisory MDVSA-2009:042.

Vulnerability Insight:
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows
remote authenticated users to access the root filesystem via a crafted
connection request that specifies a blank share name (CVE-2009-0022).

This update provides samba 3.2.7 to address this issue.

Affected: 2009.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
6.3

CVSS Vector:
AV:N/AC:M/Au:S/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0022
1021513
http://www.securitytracker.com/id?1021513
33118
http://www.securityfocus.com/bid/33118
33379
http://secunia.com/advisories/33379
33392
http://secunia.com/advisories/33392
33431
http://secunia.com/advisories/33431
51152
http://osvdb.org/51152
ADV-2009-0017
http://www.vupen.com/english/advisories/2009/0017
FEDORA-2009-0268
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
MDVSA-2009:042
http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
USN-702-1
https://usn.ubuntu.com/702-1/
http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
http://www.samba.org/samba/security/CVE-2009-0022.html
samba-file-system-security-bypass(47733)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.