CVE-2019-3880Path Traversal in Samba

CWE-22Path Traversal10 documents8 sources
Severity
5.4MEDIUMNVD
EPSS
3.4%
top 12.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateMay 14

Description

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:LExploitability: 2.8 | Impact: 2.5

Affected Packages5 packages

NVDsamba/samba3.2.04.8.11+2
Debiansamba/samba< 2:4.9.5+dfsg-3+3
CVEListV5the_samba_project/samba4.10.2, 4.8.11, 4.9.6+2
NVDopensuse/leap42.3

Also affects: Debian Linux 8.0, Fedora 28, 29, 30, Enterprise Linux 7.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rf5r-8qc3-595p: A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API2022-05-14
OSV
CVE-2019-3880: A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API2019-04-09
CVEList
CVE-2019-3880: A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API2019-04-09

📋Vendor Advisories

4
Red Hat
samba: save registry file outside share as unprivileged user2019-04-09
Ubuntu
Samba vulnerability2019-04-08
Ubuntu
Samba vulnerability2019-04-08
Debian
CVE-2019-3880: samba - A flaw was found in the way samba implemented an RPC endpoint emulating the Wind...2019

💬Community

2
Bugzilla
CVE-2019-3880 samba: save registry file outside share as unprivileged user [fedora-all]2019-04-09
Bugzilla
CVE-2019-3880 samba: save registry file outside share as unprivileged user2019-03-21
CVE-2019-3880 — Path Traversal in Samba | cvebase