CVE-2019-3870
A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.
Published
2019-04-09T16:29:01.867
Last Modified
2025-01-14T19:29:55.853
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 6.1 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:N/I:P/A:P
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
3.9
Impact Score
4.9
Weaknesses
-
Type: Secondary
CWE-276
-
Type: Primary
CWE-276
Affected Vendors & Products
References
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870
Issue Tracking, Third Party Advisory
([email protected])
-
https://bugzilla.samba.org/show_bug.cgi?id=13834
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
([email protected])
-
https://support.f5.com/csp/article/K20804356
Third Party Advisory
([email protected])
-
https://www.samba.org/samba/security/CVE-2019-3870.html
Mitigation, Patch, Vendor Advisory
([email protected])
-
https://www.synology.com/security/advisory/Synology_SA_19_15
Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.samba.org/show_bug.cgi?id=13834
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.f5.com/csp/article/K20804356
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.samba.org/samba/security/CVE-2019-3870.html
Mitigation, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.synology.com/security/advisory/Synology_SA_19_15
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)