It has been reported that the 'smbprint-new.sh' sample Samba script is prone to a local insecure temporary file handling symbolic link vulnerability. This issue is due to a design error that allows the application to insecurely write to a temporary file that is created with a predictable file name. An attacker may exploit this issue to corrupt arbitrary files. This corruption may potentially result in the elevation of privileges, or in a system wide denial of service. It should be noted that the 'smbprint-new.sh' is a sample script located in the 'examples' directory. This script is not intended for commercial use. The 'smbprint' script included in the 'packaging' directory is not vulnerable to this issue. Individual package distributions may vary.
It has been reported that the 'smbprint-new.sh' sample Samba script is prone to a local insecure temporary file handling symbolic link vulnerability. This issue is due to a design error that allows the application to insecurely write to a temporary file that is created with a predictable file name. An attacker may exploit this issue to corrupt arbitrary files. This corruption may potentially result in the elevation of privileges, or in a system wide denial of service. It should be noted that the 'smbprint-new.sh' is a sample script located in the 'examples' directory. This script is not intended for commercial use. The 'smbprint' script included in the 'packaging' directory is not vulnerable to this issue. Individual package distributions may vary.