[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.6] samba: Save registry file outside share as unprivileged user (CVE-2019-3880)

ID: oval:org.secpod.oval:def:1801387Date: (C)2019-06-20   (M)2023-11-10
Class: PATCHFamily: unix




Samba contains an RPC endpoint emulating the Windows registry service API. One of the requests, "winreg_SaveKey", is susceptible to a path/symlink traversal vulnerability. Unprivileged users can use it to create a new registry hive file anywhere they have unix permissions to create a new file within a Samba share. If they are able to create symlinks on a Samba share, they can create a new registry hive file anywhere they have write access, even outside a Samba share definition. Affected Versions:¶ All versions of samba since samba 3.2.0 Fixed In Version:¶ samba 4.8.11, 4.9.6 and 4.10.2

Platform:
Alpine Linux 3.6
Product:
samba
Reference:
10250
CVE-2019-3880
CVE    1
CVE-2019-3880
CPE    305
cpe:/a:samba:samba:3.0.21a
cpe:/a:samba:samba:3.0.23:a
cpe:/a:samba:samba:3.0.21c
cpe:/a:samba:samba:3.0.21b
...

© SecPod Technologies