vulnerability

CentOS: (CVE-2015-7560) (Multiple Advisories): samba4

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Mar 13, 2016
Added
Jul 6, 2016
Modified
May 5, 2019

Description

The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.

Solution(s)

centos-upgrade-ctdbcentos-upgrade-ctdb-develcentos-upgrade-ctdb-testscentos-upgrade-libsmbclientcentos-upgrade-libsmbclient-develcentos-upgrade-libwbclientcentos-upgrade-libwbclient-develcentos-upgrade-sambacentos-upgrade-samba-clientcentos-upgrade-samba-client-libscentos-upgrade-samba-commoncentos-upgrade-samba-common-libscentos-upgrade-samba-common-toolscentos-upgrade-samba-dccentos-upgrade-samba-dc-libscentos-upgrade-samba-develcentos-upgrade-samba-doccentos-upgrade-samba-domainjoin-guicentos-upgrade-samba-glusterfscentos-upgrade-samba-libscentos-upgrade-samba-pidlcentos-upgrade-samba-pythoncentos-upgrade-samba-swatcentos-upgrade-samba-testcentos-upgrade-samba-test-develcentos-upgrade-samba-test-libscentos-upgrade-samba-vfs-glusterfscentos-upgrade-samba-winbindcentos-upgrade-samba-winbind-clientscentos-upgrade-samba-winbind-develcentos-upgrade-samba-winbind-krb5-locatorcentos-upgrade-samba-winbind-modulescentos-upgrade-samba4centos-upgrade-samba4-clientcentos-upgrade-samba4-commoncentos-upgrade-samba4-dccentos-upgrade-samba4-dc-libscentos-upgrade-samba4-develcentos-upgrade-samba4-libscentos-upgrade-samba4-pidlcentos-upgrade-samba4-pythoncentos-upgrade-samba4-swatcentos-upgrade-samba4-testcentos-upgrade-samba4-winbindcentos-upgrade-samba4-winbind-clientscentos-upgrade-samba4-winbind-krb5-locator
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.