CVE-2019-3870
moderate-risk
Published 2019-04-09
A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.
Do I need to act?
-
0.55% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
LOCAL
/ LOW complexity
Affected Products (10)
Affected Vendors
References (14)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870
Third Party Advisory
https://support.f5.com/csp/article/K20804356
Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_15
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870
Third Party Advisory
https://support.f5.com/csp/article/K20804356
Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_15
38
/ 100
moderate-risk
Severity
20/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
16/34 · Moderate