Search for vulnerabilities
Vulnerability details: VCID-r32f-372p-aaaq
Vulnerability ID VCID-r32f-372p-aaaq
Aliases CVE-2017-2619
Summary Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-2619.html
rhas Moderate https://access.redhat.com/errata/RHSA-2017:2338
rhas Moderate https://access.redhat.com/errata/RHSA-2017:2778
rhas Moderate https://access.redhat.com/errata/RHSA-2017:2789
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.01658 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.08021 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.08021 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.08021 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.08021 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.2026 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
epss 0.30635 https://api.first.org/data/v1/epss?cve=CVE-2017-2619
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1429472
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
cvssv2 3.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.0 https://nvd.nist.gov/vuln/detail/CVE-2017-2619
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2017-2619
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2017-2619
generic_textual Medium https://ubuntu.com/security/notices/USN-3242-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3267-1
generic_textual Medium https://www.samba.org/samba/security/CVE-2017-2619.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-2619.html
https://access.redhat.com/errata/RHSA-2017:1265
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json
https://api.first.org/data/v1/epss?cve=CVE-2017-2619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
https://ubuntu.com/security/notices/USN-3242-1
https://ubuntu.com/security/notices/USN-3267-1
https://www.debian.org/security/2017/dsa-3816
https://www.exploit-db.com/exploits/41740/
https://www.samba.org/samba/security/CVE-2017-2619.html
http://www.securityfocus.com/bid/97033
http://www.securitytracker.com/id/1038117
1429472 https://bugzilla.redhat.com/show_bug.cgi?id=1429472
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.4.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.6.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
CVE-2017-2619 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1039
CVE-2017-2619 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/41740.txt
CVE-2017-2619 https://nvd.nist.gov/vuln/detail/CVE-2017-2619
RHSA-2017:2338 https://access.redhat.com/errata/RHSA-2017:2338
RHSA-2017:2778 https://access.redhat.com/errata/RHSA-2017:2778
RHSA-2017:2789 https://access.redhat.com/errata/RHSA-2017:2789
USN-3242-1 https://usn.ubuntu.com/3242-1/
USN-3267-1 https://usn.ubuntu.com/3267-1/
Data source Exploit-DB
Date added March 27, 2017
Description Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory
Ransomware campaign use Known
Source publication date March 27, 2017
Exploit type remote
Platform multiple
Source update date March 27, 2017
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1039
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:H/Au:S/C:C/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2619
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2619
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2619
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.88001
EPSS Score 0.01658
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.