Full Disclosure mailing list archives
Re: Samba Remote Zero-Day Exploit
From: paul.szabo () sydney edu au
Date: Sun, 7 Feb 2010 08:48:07 +1100
I find it puzzling how this discussion, including the official Samba response http://www.samba.org/samba/news/symlink_attack.html fails to consider whether the mentioned configuration (when admin sets non-default "writeable = yes" but leaving default "wide links = yes") allows write access to the whole filesystem (where the user has UNIX rights). I also wonder about the interaction with the setting of "unix extensions" (which I had set to non-default "no" to help Mac clients). Cheers, Paul Paul Szabo psz () maths usyd edu au http://www.maths.usyd.edu.au/u/psz/ School of Mathematics and Statistics University of Sydney Australia _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Samba Remote Zero-Day Exploit, (continued)
- Re: Samba Remote Zero-Day Exploit Michael Wojcik (Feb 09)
- Re: Samba Remote Zero-Day Exploit Stefan Kanthak (Feb 09)
- Re: Samba Remote Zero-Day Exploit Michael Wojcik (Feb 09)
- Re: Samba Remote Zero-Day Exploit Stefan Kanthak (Feb 10)
- Re: Samba Remote Zero-Day Exploit paul . szabo (Feb 06)
- Re: Samba Remote Zero-Day Exploit Krzysztof Halasa (Feb 09)
- Re: Samba Remote Zero-Day Exploit paul . szabo (Feb 06)
- Re: Samba Remote Zero-Day Exploit David Jacoby (Feb 10)