See $URL. Guess this deserves some attention, but writeable shares are needed: http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
CVE-2010-0926 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0926): The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
Vulnerable versions are no longer in the tree. GLSA Vote: no.
(In reply to comment #2) > Vulnerable versions are no longer in the tree. But may still exist installed on many systems.
(In reply to comment #3) > (In reply to comment #2) > > Vulnerable versions are no longer in the tree. > > But may still exist installed on many systems. > Hi, Krzysztof. Good point, and that is something to be considered when the team decides whether or not to publish a GLSA. At the same time, having fixed versions in the tree and stable allows us to jump ahead in the security process.
Vote: YES.
It's old so GLSA Vote: no -> Closing. Feel free to reopen if you disagree.