How to Buy
This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote file server is prone to a symlink attack.
The remote Samba server is configured insecurely and allows a remote
attacker to gain read or possibly write access to arbitrary files on
the affected host. Specifically, if an attacker has a valid Samba
account for a share that is writable or there is a writable share that
is configured to be a guest account share, he can create a symlink
using directory traversal sequences and gain access to files and
directories outside that share.
Note that successful exploitation requires that the Samba server's
'wide links' parameter be set to 'yes', which is the default.
See also :
Set 'wide links = no' in the [global] section of smbd.conf.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 44406 ()
Bugtraq ID: 38111
CVE ID: CVE-2010-0926
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.