CVE-2015-7560Improper Access Control in Samba

Severity
6.5MEDIUMNVD
OSV5.1
EPSS
4.0%
top 11.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 13
Latest updateMay 17

Description

The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDsamba/samba3.2.04.1.23+3
debiandebian/samba< samba 2:4.3.6+dfsg-1 (bookworm)
Debiansamba/samba< 2:4.3.6+dfsg-1+3
Ubuntusamba/samba< 2:4.1.6+dfsg-1ubuntu2.14.04.13

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 15.10

🔴Vulnerability Details

3
GHSA
GHSA-8wq4-qh3h-2hhh: The SMB1 implementation in smbd in Samba 32022-05-17
OSV
CVE-2015-7560: The SMB1 implementation in smbd in Samba 32016-03-13
OSV
samba vulnerabilities2016-03-08

📋Vendor Advisories

3
Red Hat
samba: Incorrect ACL get/set allowed on symlink path2016-03-08
Ubuntu
Samba vulnerabilities2016-03-08
Debian
CVE-2015-7560: samba - The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before...2015

💬Community

2
Bugzilla
CVE-2015-7560 samba: Incorrect ACL get/set allowed on symlink path [fedora-all]2016-03-09
Bugzilla
CVE-2015-7560 samba: Incorrect ACL get/set allowed on symlink path2016-02-19