vulnerability
CentOS: (CVE-2015-7560) (Multiple Advisories): samba4
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:N/I:P/A:N) | Mar 13, 2016 | Jul 6, 2016 | May 5, 2019 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Mar 13, 2016
Added
Jul 6, 2016
Modified
May 5, 2019
Description
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
Solution(s)
centos-upgrade-ctdbcentos-upgrade-ctdb-develcentos-upgrade-ctdb-testscentos-upgrade-libsmbclientcentos-upgrade-libsmbclient-develcentos-upgrade-libwbclientcentos-upgrade-libwbclient-develcentos-upgrade-sambacentos-upgrade-samba-clientcentos-upgrade-samba-client-libscentos-upgrade-samba-commoncentos-upgrade-samba-common-libscentos-upgrade-samba-common-toolscentos-upgrade-samba-dccentos-upgrade-samba-dc-libscentos-upgrade-samba-develcentos-upgrade-samba-doccentos-upgrade-samba-domainjoin-guicentos-upgrade-samba-glusterfscentos-upgrade-samba-libscentos-upgrade-samba-pidlcentos-upgrade-samba-pythoncentos-upgrade-samba-swatcentos-upgrade-samba-testcentos-upgrade-samba-test-develcentos-upgrade-samba-test-libscentos-upgrade-samba-vfs-glusterfscentos-upgrade-samba-winbindcentos-upgrade-samba-winbind-clientscentos-upgrade-samba-winbind-develcentos-upgrade-samba-winbind-krb5-locatorcentos-upgrade-samba-winbind-modulescentos-upgrade-samba4centos-upgrade-samba4-clientcentos-upgrade-samba4-commoncentos-upgrade-samba4-dccentos-upgrade-samba4-dc-libscentos-upgrade-samba4-develcentos-upgrade-samba4-libscentos-upgrade-samba4-pidlcentos-upgrade-samba4-pythoncentos-upgrade-samba4-swatcentos-upgrade-samba4-testcentos-upgrade-samba4-winbindcentos-upgrade-samba4-winbind-clientscentos-upgrade-samba4-winbind-krb5-locator

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.