Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-2127 CVE-2023-34966 CVE-2023-34967 CVE-2023-34968 |
CWE-ID | CWE-125 CWE-835 CWE-843 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise High Availability Extension 12 Operating systems & Components / Operating system SUSE Linux Enterprise Software Development Kit 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system samba-devel-32bit Operating systems & Components / Operating system package or component libsamba-policy-devel Operating systems & Components / Operating system package or component samba-devel Operating systems & Components / Operating system package or component samba-libs-32bit Operating systems & Components / Operating system package or component samba-libs-python3-32bit Operating systems & Components / Operating system package or component samba-client-libs-32bit Operating systems & Components / Operating system package or component libsamba-policy0-python3-32bit Operating systems & Components / Operating system package or component samba-libs-debuginfo-32bit Operating systems & Components / Operating system package or component samba-winbind-libs-debuginfo-32bit Operating systems & Components / Operating system package or component samba-client-libs-debuginfo-32bit Operating systems & Components / Operating system package or component samba-client-debuginfo-32bit Operating systems & Components / Operating system package or component samba-winbind-libs-32bit Operating systems & Components / Operating system package or component libsamba-policy0-python3-debuginfo-32bit Operating systems & Components / Operating system package or component samba-libs-python3-debuginfo-32bit Operating systems & Components / Operating system package or component samba-client-32bit Operating systems & Components / Operating system package or component samba-doc Operating systems & Components / Operating system package or component libsamba-policy-python3-devel Operating systems & Components / Operating system package or component samba-winbind-libs-debuginfo Operating systems & Components / Operating system package or component samba-client-libs-debuginfo Operating systems & Components / Operating system package or component ctdb Operating systems & Components / Operating system package or component samba-libs-debuginfo Operating systems & Components / Operating system package or component samba-tool Operating systems & Components / Operating system package or component samba-winbind Operating systems & Components / Operating system package or component samba-client Operating systems & Components / Operating system package or component samba-python3-debuginfo Operating systems & Components / Operating system package or component ctdb-debuginfo Operating systems & Components / Operating system package or component libsamba-policy0-python3-debuginfo Operating systems & Components / Operating system package or component samba-winbind-libs Operating systems & Components / Operating system package or component samba-libs Operating systems & Components / Operating system package or component samba-client-libs Operating systems & Components / Operating system package or component samba-libs-python3-debuginfo Operating systems & Components / Operating system package or component samba-client-debuginfo Operating systems & Components / Operating system package or component samba-python3 Operating systems & Components / Operating system package or component samba Operating systems & Components / Operating system package or component samba-debugsource Operating systems & Components / Operating system package or component samba-libs-python3 Operating systems & Components / Operating system package or component libsamba-policy0-python3 Operating systems & Components / Operating system package or component samba-debuginfo Operating systems & Components / Operating system package or component samba-ldb-ldap Operating systems & Components / Operating system package or component samba-winbind-debuginfo Operating systems & Components / Operating system package or component samba-ldb-ldap-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU78577
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-2127
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information or perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in winbindd_pam_auth_crap.c in winbind AUTH_CRAP when performing NTLM authentication. A remote attacker can trigger an out-of-bounds read error and gain access to sensitive information or crash the server.
Update the affected package samba to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
samba-devel-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-doc: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-python3-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-tool: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debugsource: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232888-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78574
Risk: Medium
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-34966
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when parsing Spotlight mdssvc RPC packets. A remote attacker can consume all available system resources and cause denial of service conditions on servers where Spotlight is explicitly enabled globally or on individual shares with "spotlight = yes".
Update the affected package samba to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
samba-devel-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-doc: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-python3-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-tool: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debugsource: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232888-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78575
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-34967
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a type confusion error when parsing Spotlight mdssvc RPC packets. A remote attacker can send specially crafted data to the server, trigger a type confusion error and crash the server.
Update the affected package samba to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
samba-devel-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-doc: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-python3-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-tool: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debugsource: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232888-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78576
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-34968
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can send a specially crafted RPC request to the server and obtain real server-side share path.
MitigationUpdate the affected package samba to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
samba-devel-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-32bit: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-doc: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy-python3-devel: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-tool: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
ctdb-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-libs: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-client-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debugsource: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-libs-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
libsamba-policy0-python3: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-winbind-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
samba-ldb-ldap-debuginfo: before 4.15.13+git.621.c8ae836ff82-3.85.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232888-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.