Vulnerability Description
Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | < 4.4.12 |
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97033Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038117Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2338Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2778Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2789Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1429472Issue TrackingThird Party Advisory
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_naThird Party Advisory
- https://www.debian.org/security/2017/dsa-3816Third Party Advisory
- https://www.exploit-db.com/exploits/41740/ExploitThird Party AdvisoryVDB Entry
- https://www.samba.org/samba/security/CVE-2017-2619.htmlVendor Advisory
- http://www.securityfocus.com/bid/97033Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038117Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2338Third Party Advisory
FAQ
What is CVE-2017-2619?
CVE-2017-2619 is a vulnerability with a CVSS score of 7.5 (HIGH). Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
How severe is CVE-2017-2619?
CVE-2017-2619 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2619?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Debian Debian Linux, Redhat Enterprise Linux.