Symlink attack in Samba - CVE-2019-3880

 

Symlink attack in Samba - CVE-2019-3880

Published: April 8, 2019


Vulnerability identifier: #VU18149
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-3880
CWE-ID: CWE-61
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Samba
Affected software:
Samba

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to a symlink following issue within the RPC endpoint emulating the Windows registry service API. A remote unprivileged attacker with ability to create a symlink can create a new registry hive file anywhere they have unix permissions to create a new file within a Samba share.

Successful exploitation of this vulnerability may allow an attacker to detect presence of exiting files on the system or perform phishing attacks and trick other users to upload files into insecure locations.

How to mitigate CVE-2019-3880

Install updates from vendor's website.

Sources