CVE-2009-2948 Details

CVE-2009-2948

Published: 2009-10-07
Last Modified: 2018-10-30
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.9/10
Exploit Score 3.4/10
Access Vector Local
Access Complexity Medium
Authentication None
Impact Score 2.9/10
Confidentiality Impact Partial
Availability Impact None
Integrity Impact None
Vector String AV:L/AC:M/Au:N/C:P/I:N/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:* No - -
References

http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://news.samba.org/releases/3.0.37/
http://news.samba.org/releases/3.2.15/
http://news.samba.org/releases/3.3.8/
http://news.samba.org/releases/3.4.2/
http://osvdb.org/58520
http://secunia.com/advisories/36893
http://secunia.com/advisories/36918
http://secunia.com/advisories/36937
http://secunia.com/advisories/36953
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
http://www.samba.org/samba/security/CVE-2009-2948.html
http://www.securityfocus.com/bid/36572
http://www.securitytracker.com/id?1022975
http://www.ubuntu.com/usn/USN-839-1
http://www.vupen.com/english/advisories/2009/2810
https://exchange.xforce.ibmcloud.com/vulnerabilities/53574
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html

CVE ID
CVE-2009-2948
Published
2009-10-07
Modified
2018-10-30
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE-264

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.