search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Samba AFS ACL mapping VFS plug-in format string vulnerability

Vulnerability Note VU#649732

Original Release Date: 2007-02-07 | Last Revised: 2007-03-29


Samba AFS ACL mapping VFS plug-in contains a format string vulnerability. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.


Samba AFS ACL mapping VFS plug-in fails to properly sanitize user-controlled file names that are used in a format specifier supplied to snprintf(). According to Samba Security Advisory CVE-2007-0454: Format string bug in VFS plug-in:

This security advisory only impacts Samba servers that share AFS file systems to CIFS clients and which have been explicitly instructed in smb.conf to load the VFS module.
This vulnerability occurred as a result of failing to comply with rule FIO30-C of the CERT C Programming Language Secure Coding Standard.


If an attacker is able to write a file to a share that uses the library, that attacker may be able to execute arbitrary code.


Apply a patch
According to Samba Security Advisory CVE-2007-0454: Format string bug in VFS plug-in:

A patch against Samba 3.0.23d has been attached to this email. This fix has be incorporated into the Samba 3.0.24 release. Patches are also available from at the Samba Security page (

Vendor Information


Samba Affected

Updated:  February 07, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was reported by Gerald Carter.

This document was written by Jeff Gennari based on information from Samba.

Other Information

CVE IDs: CVE-2007-0454
Severity Metric: 1.82
Date Public: 2007-02-05
Date First Published: 2007-02-07
Date Last Updated: 2007-03-29 19:29 UTC
Document Revision: 21

Sponsored by CISA.