Bug 1689010 (CVE-2019-3870)
Summary: | CVE-2019-3870 samba: World writable files in Samba AD DC private/ dir | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abokovoy, anoopcs, asn, bmcclain, dblechte, dfediuck, dmoppert, eedri, gdeschner, jarrpa, jstephen, lmohanty, madam, mgoldboi, michal.skrivanek, rhs-smb, sankarshan, sbonazzo, sbose, security-response-team, sherold, sisharma, ssaha, ssorce, vbellur, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 4.9.6, samba 4.10.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in Samba versions 4.9 and later. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:50:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1697718 | ||
Bug Blocks: | 1689011 |
Description
Laura Pardo
2019-03-14 22:14:50 UTC
Acknowledgments: Name: Björn Baumbach (SerNet) Statement: This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux or Red Hat Gluster Storage 3 as they did not include support for Active Directory Domain Controller. Looking at the spec file, the pysmbd code is packages in RHEL 7. It is probably not used by anything, but it is there. See http://pkgs.devel.redhat.com/cgit/rpms/samba/tree/samba.spec?h=rhel-7.6#n2042 nullIn reply to comment #5: > Looking at the spec file, the pysmbd code is packages in RHEL 7. It is > probably not used by anything, but it is there. See > > http://pkgs.devel.redhat.com/cgit/rpms/samba/tree/samba.spec?h=rhel-7.6#n2042 We do build pysmbd, but afaict the affected code belongs to python/samba/provision/ which is packaged as python-dc. python-dc is only built if %{with_dc} is enabled, which is not presently the case on Red Hat Enterprise Linux. We'll file a tracker for Fedora when this goes public. External References: https://bugzilla.samba.org/show_bug.cgi?id=13834 https://www.samba.org/samba/security/CVE-2019-3870.html Created samba tracking bugs for this issue: Affects: fedora-29 [bug 1697718] |