Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3880

Опубликовано: 09 апр. 2019
Источник: debian

Описание

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.9.5+dfsg-3package

Примечания

  • https://www.samba.org/samba/security/CVE-2019-3880.html

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 4.2
redhat
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 5.4
nvd
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

suse-cvrf
почти 7 лет назад

Security update for samba

suse-cvrf
почти 7 лет назад

Security update for samba