vulnerability
Amazon Linux AMI 2: CVE-2019-10218: Security patch for samba (ALAS-2020-1459)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Nov 6, 2019 | Jul 21, 2020 | Sep 30, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Nov 6, 2019
Added
Jul 21, 2020
Modified
Sep 30, 2022
Description
A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
Solutions
amazon-linux-ami-2-upgrade-ctdbamazon-linux-ami-2-upgrade-ctdb-testsamazon-linux-ami-2-upgrade-libsmbclientamazon-linux-ami-2-upgrade-libsmbclient-develamazon-linux-ami-2-upgrade-libwbclientamazon-linux-ami-2-upgrade-libwbclient-develamazon-linux-ami-2-upgrade-sambaamazon-linux-ami-2-upgrade-samba-clientamazon-linux-ami-2-upgrade-samba-client-libsamazon-linux-ami-2-upgrade-samba-commonamazon-linux-ami-2-upgrade-samba-common-libsamazon-linux-ami-2-upgrade-samba-common-toolsamazon-linux-ami-2-upgrade-samba-dcamazon-linux-ami-2-upgrade-samba-dc-libsamazon-linux-ami-2-upgrade-samba-debuginfoamazon-linux-ami-2-upgrade-samba-develamazon-linux-ami-2-upgrade-samba-krb5-printingamazon-linux-ami-2-upgrade-samba-libsamazon-linux-ami-2-upgrade-samba-pidlamazon-linux-ami-2-upgrade-samba-pythonamazon-linux-ami-2-upgrade-samba-python-testamazon-linux-ami-2-upgrade-samba-testamazon-linux-ami-2-upgrade-samba-test-libsamazon-linux-ami-2-upgrade-samba-vfs-glusterfsamazon-linux-ami-2-upgrade-samba-winbindamazon-linux-ami-2-upgrade-samba-winbind-clientsamazon-linux-ami-2-upgrade-samba-winbind-krb5-locatoramazon-linux-ami-2-upgrade-samba-winbind-modules
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.