Vulnerability Details : CVE-2010-0728
smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
Products affected by CVE-2010-0728
- cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0728
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0728
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST |
CWE ids for CVE-2010-0728
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-0728
-
Red Hat 2010-03-12Not vulnerable. This issue did not affect the versions of the samba package, as shipped with Red Hat Enterprise Linux 3, 4, or 5. This issue did not affect the version of the samba3x package, as shipped with Red Hat Enterprise Linux 5.
References for CVE-2010-0728
-
http://www.samba.org/samba/history/samba-3.5.1.html
-
http://www.samba.org/samba/history/samba-3.4.7.html
-
http://www.samba.org/samba/history/samba-3.3.12.html
-
http://lists.samba.org/archive/samba-announce/2010/000211.html
Vendor Advisory
-
http://www.samba.org/samba/security/CVE-2010-0728
Vendor Advisory
-
https://bugzilla.samba.org/show_bug.cgi?id=7222
Jump to