First published: Sun Mar 13 2016(Updated: )
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=3.2.0<4.1.23 | |
Samba | >=4.2.0<4.2.9 | |
Samba | >=4.3.0<4.3.6 | |
Samba | =4.4.0-rc1 | |
Samba | =4.4.0-rc2 | |
Samba | =4.4.0-rc3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7560 is classified as a medium severity vulnerability.
To fix CVE-2015-7560, update Samba to versions 4.1.23, 4.2.9, 4.3.6, or 4.4.0rc4 or later.
CVE-2015-7560 affects users of Samba versions 3.x and 4.x prior to the specified updates.
CVE-2015-7560 is a vulnerability that allows remote authenticated users to modify arbitrary ACLs.
CVE-2015-7560 was published in 2015 and affects several releases of Samba.