Vulnerability Note VU#649732

Samba AFS ACL mapping VFS plug-in format string vulnerability

Original Release date: 07 Feb 2007 | Last revised: 29 Mar 2007


Samba AFS ACL mapping VFS plug-in contains a format string vulnerability. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.


Samba AFS ACL mapping VFS plug-in fails to properly sanitize user-controlled file names that are used in a format specifier supplied to snprintf(). According to Samba Security Advisory CVE-2007-0454: Format string bug in VFS plug-in:

    This security advisory only impacts Samba servers that share AFS file systems to CIFS clients and which have been explicitly instructed in smb.conf to load the VFS module.

This vulnerability occurred as a result of failing to comply with rule FIO30-C of the CERT C Programming Language Secure Coding Standard.


If an attacker is able to write a file to a share that uses the library, that attacker may be able to execute arbitrary code.


Apply a patch
According to Samba Security Advisory CVE-2007-0454: Format string bug in VFS plug-in:

    A patch against Samba 3.0.23d has been attached to this email. This fix has be incorporated into the Samba 3.0.24 release. Patches are also available from at the Samba Security page (

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
SambaAffected-07 Feb 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Gerald Carter.

This document was written by Jeff Gennari based on information from Samba.

Other Information

  • CVE IDs: CVE-2007-0454
  • Date Public: 05 Feb 2007
  • Date First Published: 07 Feb 2007
  • Date Last Updated: 29 Mar 2007
  • Severity Metric: 1.82
  • Document Revision: 21


If you have feedback, comments, or additional information about this vulnerability, please send us email.