6.1

CVE-2019-3870

Exploit

A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SambaSamba Version >= 4.9.0 < 4.9.6
SambaSamba Version >= 4.10.0 < 4.10.2
FedoraprojectFedora Version29
FedoraprojectFedora Version30
SynologyDirectory Server Version-
SynologyRouter Manager Version1.2
SynologyDiskstation Manager Version5.2
SynologyDiskstation Manager Version6.1
SynologyDiskstation Manager Version6.2
SynologySkynas Firmware Version-
   SynologySkynas Version-
SynologyVs960hd Firmware Version < 2.3.6-1720
   SynologyVs960hd Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.68% 0.708
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 1.8 4.2
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:N/I:P/A:P
secalert@redhat.com 6.1 1.8 4.2
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CWE-276 Incorrect Default Permissions

During installation, installed file permissions are set to allow anyone to modify those files.