The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 3.2.0 (including) | 4.1.23 (excluding) |
Samba | Samba | 4.2.0 (including) | 4.2.9 (excluding) |
Samba | Samba | 4.3.0 (including) | 4.3.6 (excluding) |
Samba | Samba | 4.4.0-rc1 (including) | 4.4.0-rc1 (including) |
Samba | Samba | 4.4.0-rc2 (including) | 4.4.0-rc2 (including) |
Samba | Samba | 4.4.0-rc3 (including) | 4.4.0-rc3 (including) |
Samba | Ubuntu | devel | * |
Samba | Ubuntu | precise | * |
Samba | Ubuntu | trusty | * |
Samba | Ubuntu | wily | * |
Samba | Ubuntu | xenial | * |
Samba | Ubuntu | yakkety | * |
Samba | Ubuntu | zesty | * |
Samba4 | Ubuntu | precise | * |
Red Hat Enterprise Linux 6 | RedHat | samba-0:3.6.23-25.el6_7 | * |
Red Hat Enterprise Linux 6 | RedHat | samba4-0:4.0.0-68.el6_7.rc4 | * |
Red Hat Enterprise Linux 7 | RedHat | samba-0:4.2.3-12.el7_2 | * |
Red Hat Gluster Storage 3.1 for RHEL 6 | RedHat | samba-0:4.2.4-15.el6rhs | * |
Red Hat Gluster Storage 3.1 for RHEL 7 | RedHat | samba-0:4.2.4-15.el7rhgs | * |
Access control involves the use of several protection mechanisms such as:
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: