A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
2019-04-09T16:29:01.927
2024-11-21T04:42:47.070
Modified
CVSSv3.1: 5.4 (MEDIUM)
AV:N/AC:L/Au:S/C:N/I:P/A:P
8.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | samba | samba | < 4.8.11 | Yes |
Application | samba | samba | < 4.9.6 | Yes |
Application | samba | samba | < 4.10.2 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Application | redhat | gluster_storage | 3.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | fedoraproject | fedora | 28 | Yes |
Operating System | fedoraproject | fedora | 29 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | opensuse | leap | 42.3 | Yes |