{"vuid":"VU#649732","idnumber":"649732","name":"Samba AFS ACL mapping VFS plug-in format string vulnerability","keywords":["Samba","AFS","ACL mapping","VFS plug-in","format string","snprintf()","afsacl.so","cert-seccode:FIO30-C"],"overview":"Samba AFS ACL mapping VFS plug-in contains a format string vulnerability. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Samba AFS ACL mapping VFS plug-in fails to properly sanitize user-controlled file names that are used in a format specifier supplied to snprintf(). According to Samba Security Advisory CVE-2007-0454: Format string bug in afsacl.so VFS plug-in: This security advisory only impacts Samba servers that share AFS file systems to CIFS clients and which have been explicitly instructed in smb.conf to load the afsacl.so VFS module. This vulnerability occurred as a result of failing to comply with rule FIO30-C of the CERT C Programming Language Secure Coding Standard.","impact":"If an attacker is able to write a file to a share that uses the afsacl.so library, that attacker may be able to execute arbitrary code.","resolution":"Apply a patch\nAccording to Samba Security Advisory CVE-2007-0454: Format string bug in afsacl.so VFS plug-in: A patch against Samba 3.0.23d has been attached to this email. This fix has be incorporated into the Samba 3.0.24 release. Patches are also available from at the Samba Security page (http://www.samba.org/samba/security).","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Gerald Carter.","author":"This document was written by Jeff Gennari based on information from Samba.","public":["http://samba.org/samba/security/CVE-2007-0454.html","http://us4.samba.org/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch","http://news.samba.org/releases/3.0.24/","http://secunia.com/advisories/24021/","http://secunia.com/advisories/24060/","http://secunia.com/advisories/24046/","http://securitytracker.com/alerts/2007/Feb/1017588.html","http://secunia.com/advisories/24145/","http://www.securityfocus.com/bid/22403"],"cveids":["CVE-2007-0454"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-05T20:16:55Z","publicdate":"2007-02-05T00:00:00Z","datefirstpublished":"2007-02-07T14:01:26Z","dateupdated":"2007-03-29T19:29:02Z","revision":21,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"7","cam_impact":"19","cam_easeofexploitation":"8","cam_attackeraccessrequired":"7","cam_scorecurrent":"1.81545","cam_scorecurrentwidelyknown":"3.49125","cam_scorecurrentwidelyknownexploited":"6.28425","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.81545,"vulnote":null}