Vulnerability Details : CVE-2008-3789
Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups.
Products affected by CVE-2008-3789
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3789
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2008-3789
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-3789
-
Red Hat 2008-08-28Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2008-3789
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073
#496073 - samba: group_mapping.ldb created world writeable after manual deletion - Debian Bug report logsIssue Tracking;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44678
Samba group_mapping.tdb security bypass CVE-2008-3789 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/30837
Third Party Advisory;VDB Entry
-
http://samba.org/samba/security/CVE-2008-3789.html
Samba - Security Announcement ArchiveVendor Advisory
-
http://www.vupen.com/english/advisories/2008/2440
Site en constructionPermissions Required;Third Party Advisory
-
http://www.securitytracker.com/id?1020770
Access DeniedBroken Link;Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2008/08/26/2
oss-security - CVE Request (samba)Mailing List;Third Party Advisory
Jump to