CVE-2019-3880

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
References
Link Resource
https://www.samba.org/samba/security/CVE-2019-3880.html Mitigation Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880 Mitigation Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html Mailing List Patch Third Party Advisory
https://access.redhat.com/security/cve/cve-2019-3880 Mitigation Third Party Advisory
https://security.netapp.com/advisory/ntap-20190411-0004/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/ Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/ Mailing List Release Notes Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_15 Third Party Advisory
https://support.f5.com/csp/article/K20804356 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1966 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2099 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3582 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Information

Published : 2019-04-09 09:29

Updated : 2022-08-29 13:02


NVD link : CVE-2019-3880

Mitre link : CVE-2019-3880


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Advertisement

dedicated server usa

Products Affected

redhat

  • enterprise_linux
  • gluster_storage

fedoraproject

  • fedora

opensuse

  • leap

samba

  • samba

debian

  • debian_linux