Synology DiskStation Manager Samba Incorrect Default Permissions (CVE-2019-3870)

medium Tenable OT Security Plugin ID 502476

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870

https://bugzilla.samba.org/show_bug.cgi?id=13834

http://www.nessus.org/u?3244b94f

http://www.nessus.org/u?976baaea

https://support.f5.com/csp/article/K20804356

https://www.samba.org/samba/security/CVE-2019-3870.html

https://www.synology.com/security/advisory/Synology_SA_19_15

Plugin Details

Severity: Medium

ID: 502476

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 10/1/2024

Updated: 10/2/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Low

Base Score: 3.6

Temporal Score: 2.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2019-3870

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:synology:diskstation_manager

Required KB Items: Tenable.ot/Synology

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/9/2019

Vulnerability Publication Date: 4/9/2019

Reference Information

CVE: CVE-2019-3870

CWE: 276