9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.5%
Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd. This defect may
only be exploited when the βwins supportβ parameter has
been enabled in smb.conf.
A patch addressing this defect has been posted to
http://www.samba.org/samba/security/
Additionally, Samba 3.0.27 has been issued as a security
release to correct the defect.
Samba administrators may avoid this security issue by
disabling the βwins supportβ feature in the hosts smb.conf
file.
This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.
The time line is as follows:
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team