|
Full Disclosure
mailing list archives
Re: Samba Remote Zero-Day Exploit
From: paul.szabo () sydney edu au
Date: Sun, 7 Feb 2010 08:48:07 +1100
I find it puzzling how this discussion, including the official Samba
response
http://www.samba.org/samba/news/symlink_attack.html
fails to consider whether the mentioned configuration (when admin sets
non-default "writeable = yes" but leaving default "wide links = yes")
allows write access to the whole filesystem (where the user has UNIX
rights). I also wonder about the interaction with the setting of "unix
extensions" (which I had set to non-default "no" to help Mac clients).
Cheers, Paul
Paul Szabo psz () maths usyd edu au http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics University of Sydney Australia
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: Samba Remote Zero-Day Exploit, (continued)
Re: Samba Remote Zero-Day Exploit Thierry Zoller (Feb 06)
Samba Remote Zero-Day Exploit marxclou (Feb 06)
Re: Samba Remote Zero-Day Exploit marxclou (Feb 06)
Re: Samba Remote Zero-Day Exploit paul . szabo (Feb 06)
Re: Samba Remote Zero-Day Exploit marxclou (Feb 06)
|