CVE-2003-0086
https://notcve.org/view.php?id=CVE-2003-0086
The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown. • ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I http://marc.info/?l=bugtraq&m=104792646416629&w=2 http://marc.info/?l=bugtraq&m=104801012929374&w=2 http://secunia.com/advisories/8299 http://secunia.com/advisories/8303 http://www.debian.org/security/2003/dsa-262 http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:032 http://www.novell.com/linux/security/advisories/2003_016_samba •
CVE-2002-2196
https://notcve.org/view.php?id=CVE-2002-2196
Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc http://lists.samba.org/archive/samba-technical/2002-June/022075.html http://rhn.redhat.com/errata/RHBA-2002-209.html http://www.iss.net/security_center/static/10010.php http://www.securityfocus.com/bid/5587 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2002-1318
https://notcve.org/view.php?id=CVE-2002-1318
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string. Desbordamiento de búfer en Samba 2.2.2 a 2.2.6 permite a atacantes remotos causar una denegación de servicio y posíblemente ejecutar código arbitrario mediante una contraseña cifrada que causa un desbordamiento durante el descifrado en la cual una cadena de página de códigos DOS es convertida a una cadena unicode UCS2 little-endian. • ftp://patches.sgi.com/support/free/security/advisories/20021204-01-I http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000550 http://marc.info/?l=bugtraq&m=103801986818076&w=2 http://marc.info/?l=bugtraq&m=103859045302448&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/53580 http://us1.samba.org/samba/whatsnew/samba-2.2.7.html http://www.ciac.org/ciac/bulletins/n-019.shtml http://www.ciac.org/ciac/bulletins/n-023.shtml http://www. •
CVE-2002-0080
https://notcve.org/view.php?id=CVE-2002-0080
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed. rsync no llama adecuadamente a 'setgroups' antes de establecer los permisos, lo cual podría proveer de ciertos privilegios de grupo a usuarios locales, los cuales podrían leer ciertos ficheros que de otro modo les estarían vetados. • http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt http://www.iss.net/security_center/static/8463.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 http://www.redhat.com/support/errata/RHSA-2002-026.html http://www.securityfocus.com/bid/4285 https://access.redhat.com/security/cve/CVE-2002-0080 https://bugzilla.redhat.com/show_bug.cgi?id=1616738 • CWE-269: Improper Privilege Management •
CVE-2001-1162 – Samba 2.0.x/2.2 - Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2001-1162
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file. • https://www.exploit-db.com/exploits/20968 ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P http://ciac.llnl.gov/ciac/bulletins/l-105.shtml http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000405 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01 http://us1.samba.org/samba/whatsnew/macroexploit.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt http://www.debian.org/security/2001/dsa-065 http: •