A security issue has been discovered in jCIFS, which allows a malicious person to authenticate with an invalid username. The problem is that it is possible to authenticate with any username if the guest account is enabled on a CIFS server.
675fb88dd7cc8e44fbcc44ff7bf475680140d3ac8ec29f1e2297e835d7820b74
TITLE:
jCIFS Arbitrary Username Authentication Security Issue
SECUNIA ADVISORY ID:
SA11791
VERIFY ADVISORY:
http://secunia.com/advisories/11791/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
SOFTWARE:
jCIFS 0.x
DESCRIPTION:
A security issue has been discovered in jCIFS, which allows a
malicious person to authenticate with an invalid username.
The problem is that it is possible to authenticate with any username
if the "guest" account is enabled on a CIFS server.
SOLUTION:
Update to version 0.9.1 or later.
http://jcifs.samba.org/src/
Disable the "guest" account.
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://jcifs.samba.org/
OTHER REFERENCES:
OSVDB:
http://www.osvdb.org/6651
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------