{
  "threat_severity" : "Low",
  "public_date" : "2010-02-05T00:00:00Z",
  "bugzilla" : {
    "description" : "samba: insecure \"wide links\" default",
    "id" : "562568",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=562568"
  },
  "cvss" : {
    "cvss_base_score" : "4.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options." ],
  "statement" : "This issue was addressed in Samba packages in Red Hat Enterprise Linux 5. It did not affect Samba packages in Red Hat Enterprise Linux 6.\nThe Red Hat Security Response Team has rated this issue as having low security impact. There is no plan to address this flaw in Red Hat Enterprise Linux 4.\nTo prevent this issue, disable \"wide links\" or \"unix extensions\" in the Samba configuration file (/etc/samba/smb.conf) and restart smbd (service smb restart). Disabled \"wide links\" ensure that remote Samba clients will not have wide symbolic links (links pointing outside of the shared directory) resolved on the server side when processing requests from a client that does not support UNIX extensions. Disabled \"unix extensions\" prevents creation of wide links by malicious clients which support UNIX extensions. For further information, please view http://www.samba.org/samba/news/symlink_attack.html",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2012-02-21T00:00:00Z",
    "advisory" : "RHSA-2012:0313",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "samba-0:3.0.33-3.37.el5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 4",
    "fix_state" : "Will not fix",
    "package_name" : "samba",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "samba3x",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "samba",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2010-0926\nhttps://nvd.nist.gov/vuln/detail/CVE-2010-0926" ],
  "name" : "CVE-2010-0926",
  "csaw" : false
}