CVE-2007-2444

Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html Mailing List Third Party Advisory
http://osvdb.org/34698 Broken Link
http://secunia.com/advisories/25232 Third Party Advisory
http://secunia.com/advisories/25241 Third Party Advisory
http://secunia.com/advisories/25246 Third Party Advisory
http://secunia.com/advisories/25251 Third Party Advisory
http://secunia.com/advisories/25255 Third Party Advisory
http://secunia.com/advisories/25256 Third Party Advisory
http://secunia.com/advisories/25259 Third Party Advisory
http://secunia.com/advisories/25270 Third Party Advisory
http://secunia.com/advisories/25289 Third Party Advisory
http://secunia.com/advisories/25675 Third Party Advisory
http://secunia.com/advisories/25772 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200705-15.xml Third Party Advisory
http://securityreason.com/securityalert/2701 Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906 Mailing List Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1 Broken Link
http://www.debian.org/security/2007/dsa-1291 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:104 Broken Link
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html Third Party Advisory
http://www.samba.org/samba/security/CVE-2007-2444.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/468548/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/468670/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23974 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018049 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0017/ Broken Link
http://www.ubuntu.com/usn/usn-460-1 Third Party Advisory
http://www.ubuntu.com/usn/usn-460-2 Third Party Advisory
http://www.vupen.com/english/advisories/2007/1805 Permissions Required
http://www.vupen.com/english/advisories/2007/2210 Permissions Required
http://www.vupen.com/english/advisories/2007/2281 Permissions Required
https://issues.rpath.com/browse/RPL-1366 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*

History

29 Aug 2022, 20:19

Type Values Removed Values Added
References (SREASON) http://securityreason.com/securityalert/2701 - (SREASON) http://securityreason.com/securityalert/2701 - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1 - Broken Link
References (SECUNIA) http://secunia.com/advisories/25232 - (SECUNIA) http://secunia.com/advisories/25232 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25246 - (SECUNIA) http://secunia.com/advisories/25246 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25772 - (SECUNIA) http://secunia.com/advisories/25772 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25289 - (SECUNIA) http://secunia.com/advisories/25289 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25251 - (SECUNIA) http://secunia.com/advisories/25251 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/usn-460-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-460-1 - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id?1018049 - (SECTRACK) http://www.securitytracker.com/id?1018049 - Third Party Advisory, VDB Entry
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:104 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:104 - Broken Link
References (SECUNIA) http://secunia.com/advisories/25256 - (SECUNIA) http://secunia.com/advisories/25256 - Third Party Advisory
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906 - Mailing List, Third Party Advisory
References (CONFIRM) http://www.samba.org/samba/security/CVE-2007-2444.html - Patch (CONFIRM) http://www.samba.org/samba/security/CVE-2007-2444.html - Patch, Vendor Advisory
References (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html - (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25255 - (SECUNIA) http://secunia.com/advisories/25255 - Third Party Advisory
References (OSVDB) http://osvdb.org/34698 - (OSVDB) http://osvdb.org/34698 - Broken Link
References (UBUNTU) http://www.ubuntu.com/usn/usn-460-2 - (UBUNTU) http://www.ubuntu.com/usn/usn-460-2 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25241 - (SECUNIA) http://secunia.com/advisories/25241 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25270 - (SECUNIA) http://secunia.com/advisories/25270 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/23974 - (BID) http://www.securityfocus.com/bid/23974 - Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2007/dsa-1291 - (DEBIAN) http://www.debian.org/security/2007/dsa-1291 - Third Party Advisory
References (TRUSTIX) http://www.trustix.org/errata/2007/0017/ - (TRUSTIX) http://www.trustix.org/errata/2007/0017/ - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/2281 - (VUPEN) http://www.vupen.com/english/advisories/2007/2281 - Permissions Required
References (SECUNIA) http://secunia.com/advisories/25675 - (SECUNIA) http://secunia.com/advisories/25675 - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/468548/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/468548/100/0/threaded - Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/468670/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/468670/100/0/threaded - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/25259 - (SECUNIA) http://secunia.com/advisories/25259 - Third Party Advisory
References (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html - (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/1805 - (VUPEN) http://www.vupen.com/english/advisories/2007/1805 - Permissions Required
References (CONFIRM) https://issues.rpath.com/browse/RPL-1366 - (CONFIRM) https://issues.rpath.com/browse/RPL-1366 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/2210 - (VUPEN) http://www.vupen.com/english/advisories/2007/2210 - Permissions Required
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200705-15.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200705-15.xml - Third Party Advisory
References (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980 - (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980 - Broken Link
CPE cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
First Time Canonical
Debian debian Linux
Debian
Canonical ubuntu Linux
CWE NVD-CWE-Other CWE-269

Information

Published : 2007-05-14 21:19

Updated : 2023-12-10 10:40


NVD link : CVE-2007-2444

Mitre link : CVE-2007-2444

CVE.ORG link : CVE-2007-2444


JSON object : View

Products Affected

canonical

  • ubuntu_linux

samba

  • samba

debian

  • debian_linux
CWE
CWE-269

Improper Privilege Management