Vulnerability Description
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 3.2.0, < 4.8.11 |
| Debian | Debian Linux | 8.0 |
| Redhat | Gluster Storage | 3.0 |
| Redhat | Enterprise Linux | 7.0 |
| Fedoraproject | Fedora | 28 |
| Opensuse | Leap | 42.3 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.htmlMailing ListPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.htmlThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1966Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1967Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2099Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3582Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880Issue TrackingMitigationThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/04/msg00013.htmlThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20190411-0004/Third Party Advisory
- https://support.f5.com/csp/article/K20804356Third Party Advisory
- https://www.samba.org/samba/security/CVE-2019-3880.htmlMitigationPatchVendor Advisory
- https://www.synology.com/security/advisory/Synology_SA_19_15Third Party Advisory
FAQ
What is CVE-2019-3880?
CVE-2019-3880 is a vulnerability with a CVSS score of 5.4 (MEDIUM). A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they ...
How severe is CVE-2019-3880?
CVE-2019-3880 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3880?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Debian Debian Linux, Redhat Gluster Storage, Redhat Enterprise Linux, Fedoraproject Fedora.