CVE-2015-7560
Published: 8 March 2016
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
precise |
Released
(2:3.6.3-2ubuntu2.17)
|
trusty |
Released
(2:4.1.6+dfsg-1ubuntu2.14.04.13)
|
|
upstream |
Needs triage
|
|
wily |
Released
(2:4.1.17+dfsg-4ubuntu3.3)
|
|
xenial |
Released
(2:4.3.6+dfsg-1ubuntu1)
|
|
yakkety |
Released
(2:4.3.6+dfsg-1ubuntu1)
|
|
zesty |
Released
(2:4.3.6+dfsg-1ubuntu1)
|
|
samba4 Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |