Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10197

Опубликовано: 03 сент. 2019
Источник: redhat
CVSS3: 6.5

Описание

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

A flaw was found in samba when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside of the share.

Отчет

Only samba configurations where 'wide links' option is explicitly set to 'yes' is affected by this flaw. Therefore default configurations of samba package shipped with Red Hat Products are not affected. This vulnerability exists in the samba server, client side packages are not affected.

Меры по смягчению последствий

The following methods can be used as a mitigation (only one is needed):

  1. Use the 'sharesec' tool to configure a security descriptor for the share that's at least as strict as the permissions on the share root directory.
  2. Use the 'valid users' option to allow only users/groups which are able to enter the share root directory.
  3. Remove 'wide links = yes' if it's not really needed.
  4. In some situations it might be an option to use 'chmod a+x' on the share root directory, but you need to make sure that files and subdirectories are protected by stricter permissions. You may also want to 'chmod a-w' in order to prevent new top level files and directories, which may have less restrictive permissions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sambaNot affected
Red Hat Enterprise Linux 6samba4Not affected
Red Hat Virtualization 4redhat-virtualization-hostNot affected
Red Hat Enterprise Linux 7sambaFixedRHSA-2020:108431.03.2020
Red Hat Enterprise Linux 8openchangeFixedRHSA-2020:187828.04.2020
Red Hat Enterprise Linux 8sambaFixedRHSA-2020:187828.04.2020
Red Hat Enterprise Linux 8openchangeFixedRHSA-2020:187828.04.2020
Red Hat Enterprise Linux 8sambaFixedRHSA-2020:187828.04.2020
Red Hat Gluster Storage 3.5 for RHEL 6sambaFixedRHSA-2019:402302.12.2019
Red Hat Gluster Storage 3.5 for RHEL 7sambaFixedRHSA-2019:325330.10.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1746225samba: Combination of parameters and permissions can allow user to escape from the share path definition

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 6 лет назад

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

CVSS3: 6.5
nvd
больше 6 лет назад

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

CVSS3: 6.5
debian
больше 6 лет назад

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up ...

suse-cvrf
больше 6 лет назад

Security update for samba

CVSS3: 9.1
github
больше 3 лет назад

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

6.5 Medium

CVSS3