samba_arbitrary_file_access.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 66 行

NASL
66
字号
##  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>#  based on work from#  (C) Tenable Network Security##  Ref: Karol Wiesek - iDEFENSE ##  This script is released under the GNU GPL v2#if(description){ script_id(15394); script_bugtraq_id(11216, 11281); script_cve_id("CVE-2004-0815"); script_version ("$Revision: 38 $"); name["english"] = "Samba Remote Arbitrary File Access"; script_name(english:name["english"]);  desc["english"] = "The remote Samba server, according to its version number, is vulnerable to a remote file access vulnerability.  This vulnerability allows an attacker to access arbitrary files which existoutside of the shares's defined path.An attacker needs a valid account to exploit this flaw.Solution : Upgrade to Samba 2.2.11 or 3.0.7Risk factor : High"; script_description(english:desc["english"]);  summary["english"] = "checks samba version"; summary["francais"] = "v閞ifie la version de samba";  script_summary(english:summary["english"], francais:summary["francais"]);  script_category(ACT_GATHER_INFO);   script_copyright(english:"This script is Copyright (C) 2004 David Maciejak");  family["english"] = "Remote file access"; script_family(english:family["english"]); script_dependencie("smb_nativelanman.nasl"); script_require_keys("SMB/NativeLanManager"); exit(0);}## The script code starts here#lanman = get_kb_item("SMB/NativeLanManager");if("Samba" >< lanman){ if(ereg(pattern:"Samba 2\.2\.([0-9]|10)[^0-9]*$",string:lanman))   security_hole(139);	  if(ereg(pattern:"Samba 3\.0\.[0-5]$", string:lanman))   security_hole(139);}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?