Ask the Community
Groups
CVE-2015-7560 samba: Incorrect ACL get/set allowed on symlink path - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-7560</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A flaw was found in the way Samba handled ACLs on symbolic links. An<br>authenticated user could use this flaw to gain access to an arbitrary file or<br>directory by overwriting its ACL.<br><br>CVSS2 Base Score 3.5<br>Impact: Moderate <br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Resolution:<br>This was fixed in samba-3.6.23-25.el6_7.x86_64 and later. <br>Apply Unitrends security update v10.29 from 07/27/2018 or later, containing samba-3.6.23-45.el6_9.x86_64</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2015-7560%250D%250Ahttp%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2015-7560">https://access.redhat.com/security/cve/cve-2015-7560 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7560</a></li></ul> </article> </main>