
CVE-2009-2813 – Samba: Share restriction bypass via home-less directory user account(s)
https://notcve.org/view.php?id=CVE-2009-2813
14 Sep 2009 — Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories. Samba 3.4 en versiones anteriores a 3.4.2, ... • http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2009-1886 – Samba 3.3.5 - Format String / Security Bypass
https://notcve.org/view.php?id=CVE-2009-1886
24 Jun 2009 — Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename. Múltiples vulnerabilidades de formato de cadena en client/client.c en smbclient en Samba v3.2.0 hasta v3.2.12 podría permitir dependiendo del contexto a atacantes ejecutar código de su elección a través del formato de cadena especificado en un nombre de fichero. • https://www.exploit-db.com/exploits/33053 • CWE-134: Use of Externally-Controlled Format String •

CVE-2009-1888 – Samba improper file access
https://notcve.org/view.php?id=CVE-2009-1888
24 Jun 2009 — The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory. La función acl_group_override en smbd/posix_acls.c en smbd en Samba v3.0.x anterior a v3.0.35, v3.1.x y v3.2.x anterior a v3.2.13, y v3.3.x anterior 3.3.6, cuando el modo de fichero dos está habilitado, permite ... • http://secunia.com/advisories/35539 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2009-0022
https://notcve.org/view.php?id=CVE-2009-0022
05 Jan 2009 — Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name. Samba v3.2.0 hasta v3.2.6, cuando el registro de acciones está habilitado, permite a usuarios autenticados remotamente acceder al sistema de ficheros raíz a través de una petición de conexión manipulada que especifica un nombre de recurso compartido en blanco. • http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch • CWE-20: Improper Input Validation •

CVE-2008-4314
https://notcve.org/view.php?id=CVE-2008-4314
01 Dec 2008 — smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&paste error" that causes an improper bounds check to be performed. Una vulnerabilidad en smbd en versiones de Samba desde la 3.0.29 hasta la 3.2.4 podría permitir a atacantes remotos leer zonas arbitrarias de memoria y causar una denegación de servicio a través de peticiones modificadas de (1)trans, (2) trans2, y... • http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2008-3789
https://notcve.org/view.php?id=CVE-2008-3789
27 Aug 2008 — Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups. Samba 3.2.0 usa permisos débiles (0666) para los archivos (1) group_mapping.tdb y (2) group_mapping.ldb, lo que permite a usuarios locales modificar la pertenencia a los Grupos Unix. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073 • CWE-732: Incorrect Permission Assignment for Critical Resource •