### [CVE-2019-3880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880) ![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22&color=brighgreen) ### Description A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable. ### POC #### Reference - https://www.synology.com/security/advisory/Synology_SA_19_15 - https://www.synology.com/security/advisory/Synology_SA_19_15 #### Github No PoCs found on GitHub currently.