Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150724
Category:Privilege escalation
Title:Samba 3.0.23d <= 3.0.25pre2 User Privilege Elevation Vulnerability (CVE-2007-2444)
Summary:Local SID/Name translation bug can result in user privilege elevation.
Description:Summary:
Local SID/Name translation bug can result in user privilege elevation.

Vulnerability Insight:
When translating SIDs to/from names using Samba local
list of user and group accounts, a logic error in the
smbd daemon's internal security stack may result in a
transition to the root user id rather than the non-root
user. The user is then able to temporarily issue SMB/CIFS
protocol operations as the root user. This window of
opportunity may allow the attacker to establish additional
means of gaining root access to the server.

Affected Software/OS:
Samba versions 3.0.23d through 3.0.25pre2.

Solution:
Apply the patch mentioned in the linked reference.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2444
1018049
http://www.securitytracker.com/id?1018049
102964
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
200588
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
2007-0017
http://www.trustix.org/errata/2007/0017/
20070513 [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure Can Result in User Privilege Elevation
http://www.securityfocus.com/archive/1/468548/100/0/threaded
20070515 FLEA-2007-0017-1: samba
http://www.securityfocus.com/archive/1/468670/100/0/threaded
23974
http://www.securityfocus.com/bid/23974
25232
http://secunia.com/advisories/25232
25241
http://secunia.com/advisories/25241
25246
http://secunia.com/advisories/25246
25251
http://secunia.com/advisories/25251
25255
http://secunia.com/advisories/25255
25256
http://secunia.com/advisories/25256
25259
http://secunia.com/advisories/25259
25270
http://secunia.com/advisories/25270
25289
http://secunia.com/advisories/25289
25675
http://secunia.com/advisories/25675
25772
http://secunia.com/advisories/25772
2701
http://securityreason.com/securityalert/2701
34698
http://osvdb.org/34698
ADV-2007-1805
http://www.vupen.com/english/advisories/2007/1805
ADV-2007-2210
http://www.vupen.com/english/advisories/2007/2210
ADV-2007-2281
http://www.vupen.com/english/advisories/2007/2281
DSA-1291
http://www.debian.org/security/2007/dsa-1291
GLSA-200705-15
http://security.gentoo.org/glsa/glsa-200705-15.xml
HPSBTU02218
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
MDKSA-2007:104
http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
OpenPKG-SA-2007.012
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
SSA:2007-134-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
SSRT071424
SUSE-SA:2007:031
http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
USN-460-1
http://www.ubuntu.com/usn/usn-460-1
USN-460-2
http://www.ubuntu.com/usn/usn-460-2
http://www.samba.org/samba/security/CVE-2007-2444.html
https://issues.rpath.com/browse/RPL-1366
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.