"Samba is prone to a directory-traversal vulnerability because the
application fails to sufficiently sanitize user-supplied input.
Exploits would allow an attacker to access files outside of the Samba
user's root directory to obtain sensitive information and perform other
To exploit this issue, attackers require authenticated access to a
writable share. Note that this issue may be exploited through a writable
share accessible by guest accounts.
NOTE: The vendor stated that this issue stems from an insecure default
configuration. The Samba team advises administrators to set 'wide links
= no' in the '[global]' section of 'smb.conf'."
It is recommended that admins check their global setting of the wide
links option in their smb.conf file. Please set it to "no" unless you
otherwise need wide links.