[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Samba Remote Zero-Day Exploit
- To: bugtraq@xxxxxxxxxxxxxxxxx, full-disclosure@xxxxxxxxxxxxxxxxx, kcope2@xxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] Samba Remote Zero-Day Exploit
- From: paul.szabo@xxxxxxxxxxxxx
- Date: Sat, 6 Feb 2010 09:03:54 +1100
Dear Kingcope,
The samba server follows symlinks by default. There are options
("follow symlinks", "wide links") for turning it off:
http://www.samba.org/samba/docs/using_samba/ch08.html#samba2-CHP-8-SECT-1.2
http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#FOLLOWSYMLINKS
http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#WIDELINKS
The "problem" at your installation seems a mis-configuration of
your server: please ask the admin to set "secure" options.
(Some samba installations, like mine, wish to allow same access as a
UNIX login would allow. Some shares like [home] are provided for ease
of use, users are encouraged to create symlinks to other "interesting"
places e.g. NFS-mounted directories.)
Cheers, Paul
Paul Szabo psz@xxxxxxxxxxxxxxxxx http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics University of Sydney Australia
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/