{"id":"CVE-2017-2619","details":"Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.","modified":"2026-05-08T12:15:33.520441Z","published":"2018-03-12T15:29:00.443Z","related":["SUSE-RU-2017:1217-1","SUSE-RU-2017:1218-1","SUSE-RU-2017:1219-1","SUSE-SU-2017:0841-1","SUSE-SU-2017:0858-1","SUSE-SU-2017:0859-1","SUSE-SU-2017:0862-1","SUSE-SU-2017:1216-1","openSUSE-SU-2024:11365-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/97033"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038117"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1265"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2338"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2778"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2789"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3816"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2017-2619.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429472"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/41740/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"0"},{"fixed":"3f2864eb8567682976a6a9aeaee3481be23d370d"},{"introduced":"916fab083a8cb5c10365da7f3a85d0bbfde4a30e"},{"fixed":"3da28b834460e8ac8a24853a03bc2317a7d16e53"},{"introduced":"f17816a4ae2bb0ed45561347a4c578ca9ab28ccf"},{"fixed":"1a8f3cfb4ebc21a0889c7692591ae41a46d7dfb2"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"4.4.12"},{"introduced":"4.5.0"},{"fixed":"4.5.7"},{"introduced":"4.6.0"},{"fixed":"4.6.1"}]}}],"versions":["ldb-1.1.0","ldb-1.1.10","ldb-1.1.11","ldb-1.1.12","ldb-1.1.13","ldb-1.1.14","ldb-1.1.15","ldb-1.1.16","ldb-1.1.17","ldb-1.1.18","ldb-1.1.19","ldb-1.1.2","ldb-1.1.20","ldb-1.1.21","ldb-1.1.22","ldb-1.1.23","ldb-1.1.25","ldb-1.1.3","ldb-1.1.4","ldb-1.1.5","ldb-1.1.6","ldb-1.1.8","ldb-1.1.9","samba-4.0.0alpha10","samba-4.0.0alpha17","samba-4.0.0alpha18","samba-4.0.0alpha19","samba-4.0.0alpha20","samba-4.0.0alpha21","samba-4.0.0alpha6","samba-4.0.0alpha7","samba-4.0.0alpha8","samba-4.0.0alpha9","samba-4.0.0beta1","samba-4.0.0beta2","samba-4.0.0beta3","samba-4.0.0beta4","samba-4.0.0beta5","samba-4.0.0beta6","samba-4.0.0beta7","samba-4.0.0beta8","samba-4.0.0rc1","samba-4.2.0rc1","samba-4.3.0rc1","samba-4.4.0","samba-4.4.0rc1","samba-4.4.0rc2","samba-4.4.0rc3","samba-4.4.0rc4","samba-4.4.0rc5","samba-4.4.1","samba-4.4.10","samba-4.4.11","samba-4.4.2","samba-4.4.3","samba-4.4.4","samba-4.4.7","samba-4.5.0","samba-4.5.4","samba-4.5.5","samba-4.5.6","samba-4.6.0","talloc-1.3.1","talloc-2.0.0","talloc-2.0.7","talloc-2.0.8","talloc-2.1.0","talloc-2.1.1","talloc-2.1.2","talloc-2.1.3","talloc-2.1.4","talloc-2.1.5","tdb-1.1.5","tdb-1.2.0","tdb-1.2.1","tdb-1.2.10","tdb-1.2.11","tdb-1.2.12","tdb-1.2.13","tdb-1.3.0","tdb-1.3.1","tdb-1.3.2","tdb-1.3.3","tdb-1.3.4","tdb-1.3.5","tdb-1.3.6","tdb-1.3.7","tdb-1.3.8","tevent-0.9.11","tevent-0.9.12","tevent-0.9.13","tevent-0.9.14","tevent-0.9.15","tevent-0.9.16","tevent-0.9.17","tevent-0.9.18","tevent-0.9.19","tevent-0.9.20","tevent-0.9.21","tevent-0.9.22","tevent-0.9.23","tevent-0.9.24","tevent-0.9.25","tevent-0.9.26","tevent-0.9.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2619.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}