Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3880

Опубликовано: 09 апр. 2019
Источник: redhat
CVSS3: 4.2

Описание

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share.

Отчет

This issue affects the version of samba shipped with Red Hat Gluster Storage 3, as it contains the vulnerable functionality.

Меры по смягчению последствий

Either turn off SMB1 by setting the global parameter: 'min protocol = SMB2' or if SMB1 is required turn off unix extensions by setting the global parameter: 'unix extensions = no' in the smb.conf file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sambaWill not fix
Red Hat Enterprise Linux 6sambaWill not fix
Red Hat Enterprise Linux 6samba4Will not fix
Red Hat Virtualization 4redhat-virtualization-hostNot affected
Red Hat Enterprise Linux 7sambaFixedRHSA-2019:209906.08.2019
Red Hat Enterprise Linux 8sambaFixedRHSA-2019:358205.11.2019
Red Hat Enterprise Linux 8sambaFixedRHSA-2019:358205.11.2019
Red Hat Gluster Storage 3.4 for RHEL 6libtallocFixedRHSA-2019:196730.07.2019
Red Hat Gluster Storage 3.4 for RHEL 6libtdbFixedRHSA-2019:196730.07.2019
Red Hat Gluster Storage 3.4 for RHEL 6libteventFixedRHSA-2019:196730.07.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1691518samba: save registry file outside share as unprivileged user

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 5.4
nvd
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 5.4
debian
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulatin ...

suse-cvrf
почти 7 лет назад

Security update for samba

suse-cvrf
почти 7 лет назад

Security update for samba

4.2 Medium

CVSS3