Severity
7.5HIGHNVD
EPSS
8.2%
top 7.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 3
Latest updateApr 29

Description

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/samba< samba 3.0.6-1 (bookworm)
Debiansamba/samba< 3.0.6-1+3
NVDsamba/samba20 versions+19

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fmc4-f425-jjcv: The unix_clean_name function in Samba 22022-04-29
OSV
CVE-2004-0815: The unix_clean_name function in Samba 22004-11-03

📋Vendor Advisories

2
Red Hat
security flaw2004-09-30
Debian
CVE-2004-0815: samba - The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0...2004

📐Framework References

3
CWE
Path Equivalence: '/./' (Single Dot Directory)
CWE
Improper Resolution of Path Equivalence
CWE
Collapse of Data into Unsafe Value

💬Community

1
Bugzilla
CVE-2004-0815 security flaw2018-08-16