openEuler 22.03 LTS SP1 update for samba



Published: 2023-07-29
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2022-2127
CVE-2023-3347
CVE-2023-34966
CVE-2023-34967
CWE-ID CWE-125
CWE-254
CWE-835
CWE-843
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

samba-vfs-glusterfs
Operating systems & Components / Operating system package or component

samba-pidl
Operating systems & Components / Operating system package or component

libwbclient
Operating systems & Components / Operating system package or component

libwbclient-devel
Operating systems & Components / Operating system package or component

samba-winbind-krb5-locator
Operating systems & Components / Operating system package or component

samba-dc-libs
Operating systems & Components / Operating system package or component

python3-samba-test
Operating systems & Components / Operating system package or component

libsmbclient
Operating systems & Components / Operating system package or component

samba-usershares
Operating systems & Components / Operating system package or component

samba-common-tools
Operating systems & Components / Operating system package or component

ctdb
Operating systems & Components / Operating system package or component

samba-dc
Operating systems & Components / Operating system package or component

samba-test
Operating systems & Components / Operating system package or component

samba-help
Operating systems & Components / Operating system package or component

samba-client-libs
Operating systems & Components / Operating system package or component

samba-krb5-printing
Operating systems & Components / Operating system package or component

samba-dc-provision
Operating systems & Components / Operating system package or component

samba-winbind-clients
Operating systems & Components / Operating system package or component

python3-samba
Operating systems & Components / Operating system package or component

python3-samba-dc
Operating systems & Components / Operating system package or component

samba-dc-bind-dlz
Operating systems & Components / Operating system package or component

samba-devel
Operating systems & Components / Operating system package or component

samba-client
Operating systems & Components / Operating system package or component

samba-debuginfo
Operating systems & Components / Operating system package or component

samba-libs
Operating systems & Components / Operating system package or component

samba-winbind
Operating systems & Components / Operating system package or component

libsmbclient-devel
Operating systems & Components / Operating system package or component

samba-winbind-modules
Operating systems & Components / Operating system package or component

samba-debugsource
Operating systems & Components / Operating system package or component

samba-common
Operating systems & Components / Operating system package or component

samba
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU78577

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-2127

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information or perform denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in winbindd_pam_auth_crap.c in winbind AUTH_CRAP when performing NTLM authentication. A remote attacker can trigger an out-of-bounds read error and gain access to sensitive information or crash the server.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

samba-vfs-glusterfs: before 4.17.5-6

samba-pidl: before 4.17.5-6

libwbclient: before 4.17.5-6

libwbclient-devel: before 4.17.5-6

samba-winbind-krb5-locator: before 4.17.5-6

samba-dc-libs: before 4.17.5-6

python3-samba-test: before 4.17.5-6

libsmbclient: before 4.17.5-6

samba-usershares: before 4.17.5-6

samba-common-tools: before 4.17.5-6

ctdb: before 4.17.5-6

samba-dc: before 4.17.5-6

samba-test: before 4.17.5-6

samba-help: before 4.17.5-6

samba-client-libs: before 4.17.5-6

samba-krb5-printing: before 4.17.5-6

samba-dc-provision: before 4.17.5-6

samba-winbind-clients: before 4.17.5-6

python3-samba: before 4.17.5-6

python3-samba-dc: before 4.17.5-6

samba-dc-bind-dlz: before 4.17.5-6

samba-devel: before 4.17.5-6

samba-client: before 4.17.5-6

samba-debuginfo: before 4.17.5-6

samba-libs: before 4.17.5-6

samba-winbind: before 4.17.5-6

libsmbclient-devel: before 4.17.5-6

samba-winbind-modules: before 4.17.5-6

samba-debugsource: before 4.17.5-6

samba-common: before 4.17.5-6

samba: before 4.17.5-6

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1452


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Security features bypass

EUVDB-ID: #VU78573

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-3347

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to SMB2 packet signing feature is not enforced if the server is configured with the "server signing = required" option or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. A remote attacker can intercept and manipulate data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

samba-vfs-glusterfs: before 4.17.5-6

samba-pidl: before 4.17.5-6

libwbclient: before 4.17.5-6

libwbclient-devel: before 4.17.5-6

samba-winbind-krb5-locator: before 4.17.5-6

samba-dc-libs: before 4.17.5-6

python3-samba-test: before 4.17.5-6

libsmbclient: before 4.17.5-6

samba-usershares: before 4.17.5-6

samba-common-tools: before 4.17.5-6

ctdb: before 4.17.5-6

samba-dc: before 4.17.5-6

samba-test: before 4.17.5-6

samba-help: before 4.17.5-6

samba-client-libs: before 4.17.5-6

samba-krb5-printing: before 4.17.5-6

samba-dc-provision: before 4.17.5-6

samba-winbind-clients: before 4.17.5-6

python3-samba: before 4.17.5-6

python3-samba-dc: before 4.17.5-6

samba-dc-bind-dlz: before 4.17.5-6

samba-devel: before 4.17.5-6

samba-client: before 4.17.5-6

samba-debuginfo: before 4.17.5-6

samba-libs: before 4.17.5-6

samba-winbind: before 4.17.5-6

libsmbclient-devel: before 4.17.5-6

samba-winbind-modules: before 4.17.5-6

samba-debugsource: before 4.17.5-6

samba-common: before 4.17.5-6

samba: before 4.17.5-6

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1452


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Infinite loop

EUVDB-ID: #VU78574

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34966

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when parsing Spotlight mdssvc RPC packets. A remote attacker can consume all available system resources and cause denial of service conditions on servers where Spotlight is explicitly enabled globally or on individual shares with "spotlight = yes".

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

samba-vfs-glusterfs: before 4.17.5-6

samba-pidl: before 4.17.5-6

libwbclient: before 4.17.5-6

libwbclient-devel: before 4.17.5-6

samba-winbind-krb5-locator: before 4.17.5-6

samba-dc-libs: before 4.17.5-6

python3-samba-test: before 4.17.5-6

libsmbclient: before 4.17.5-6

samba-usershares: before 4.17.5-6

samba-common-tools: before 4.17.5-6

ctdb: before 4.17.5-6

samba-dc: before 4.17.5-6

samba-test: before 4.17.5-6

samba-help: before 4.17.5-6

samba-client-libs: before 4.17.5-6

samba-krb5-printing: before 4.17.5-6

samba-dc-provision: before 4.17.5-6

samba-winbind-clients: before 4.17.5-6

python3-samba: before 4.17.5-6

python3-samba-dc: before 4.17.5-6

samba-dc-bind-dlz: before 4.17.5-6

samba-devel: before 4.17.5-6

samba-client: before 4.17.5-6

samba-debuginfo: before 4.17.5-6

samba-libs: before 4.17.5-6

samba-winbind: before 4.17.5-6

libsmbclient-devel: before 4.17.5-6

samba-winbind-modules: before 4.17.5-6

samba-debugsource: before 4.17.5-6

samba-common: before 4.17.5-6

samba: before 4.17.5-6

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1452


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Type Confusion

EUVDB-ID: #VU78575

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34967

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a type confusion error when parsing Spotlight mdssvc RPC packets. A remote attacker can send specially crafted data to the server, trigger a type confusion error and crash the server.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

samba-vfs-glusterfs: before 4.17.5-6

samba-pidl: before 4.17.5-6

libwbclient: before 4.17.5-6

libwbclient-devel: before 4.17.5-6

samba-winbind-krb5-locator: before 4.17.5-6

samba-dc-libs: before 4.17.5-6

python3-samba-test: before 4.17.5-6

libsmbclient: before 4.17.5-6

samba-usershares: before 4.17.5-6

samba-common-tools: before 4.17.5-6

ctdb: before 4.17.5-6

samba-dc: before 4.17.5-6

samba-test: before 4.17.5-6

samba-help: before 4.17.5-6

samba-client-libs: before 4.17.5-6

samba-krb5-printing: before 4.17.5-6

samba-dc-provision: before 4.17.5-6

samba-winbind-clients: before 4.17.5-6

python3-samba: before 4.17.5-6

python3-samba-dc: before 4.17.5-6

samba-dc-bind-dlz: before 4.17.5-6

samba-devel: before 4.17.5-6

samba-client: before 4.17.5-6

samba-debuginfo: before 4.17.5-6

samba-libs: before 4.17.5-6

samba-winbind: before 4.17.5-6

libsmbclient-devel: before 4.17.5-6

samba-winbind-modules: before 4.17.5-6

samba-debugsource: before 4.17.5-6

samba-common: before 4.17.5-6

samba: before 4.17.5-6

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1452


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###