CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
EPSS
Percentile
56.6%
A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.
[
{
"product": "samba",
"vendor": "The Samba Project",
"versions": [
{
"status": "affected",
"version": "4.9.6"
},
{
"status": "affected",
"version": "4.10.2"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870
bugzilla.samba.org/show_bug.cgi?id=13834
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
support.f5.com/csp/article/K20804356
www.samba.org/samba/security/CVE-2019-3870.html
www.synology.com/security/advisory/Synology_SA_19_15