CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
86.5%
asolino reports:
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via …/ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | py37-impacket | = 0.9.10 | UNKNOWN |
FreeBSD | any | noarch | py37-impacket | < 0.9.23 | UNKNOWN |
FreeBSD | any | noarch | py38-impacket | = 0.9.10 | UNKNOWN |
FreeBSD | any | noarch | py38-impacket | < 0.9.23 | UNKNOWN |
FreeBSD | any | noarch | py39-impacket | = 0.9.10 | UNKNOWN |
FreeBSD | any | noarch | py39-impacket | < 0.9.23 | UNKNOWN |
FreeBSD | any | noarch | py310-impacket | = 0.9.10 | UNKNOWN |
FreeBSD | any | noarch | py310-impacket | < 0.9.23 | UNKNOWN |
FreeBSD | any | noarch | py311-impacket | = 0.9.10 | UNKNOWN |
FreeBSD | any | noarch | py311-impacket | < 0.9.23 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
86.5%