A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
{
"versions": [
{
"introduced": "3.2.0"
},
{
"fixed": "4.8.11"
},
{
"introduced": "4.9.0"
},
{
"fixed": "4.9.6"
},
{
"introduced": "4.10.0"
},
{
"fixed": "4.10.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3880.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "28"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "30"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.3"
}
]
}
]