First published: Thu Mar 21 2019(Updated: )
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.8.11 | 4.8.11 |
redhat/samba | <4.9.6 | 4.9.6 |
redhat/samba | <4.10.2 | 4.10.2 |
Samba Samba | >=3.2.0<4.8.11 | |
Samba Samba | >=4.9.0<4.9.6 | |
Samba Samba | >=4.10.0<4.10.2 | |
Debian Debian Linux | =8.0 | |
Redhat Gluster Storage | =3.0 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3880 is a vulnerability in Samba that allows an unprivileged attacker to create a new registry hive file anywhere they have Unix permissions.
CVE-2019-3880 allows an attacker to create a new file in the Samba share.
The severity of CVE-2019-3880 is medium with a CVSS score of 5.4.
Samba versions before 4.8.11, 4.9.6, and 4.10.2 are affected by CVE-2019-3880.
To fix CVE-2019-3880, you should update Samba to version 4.8.11, 4.9.6, or 4.10.2.