Amazon Linux AMI update for samba



Risk Medium
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2018-14628
CVE-2020-25720
CVE-2023-0225
CVE-2023-0614
CVE-2023-0922
CWE-ID CWE-284
CWE-264
CWE-319
Exploitation vector Network
Public exploit N/A
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

samba
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU83535

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-14628

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to improper access restrictions when Samba is an Active Directory Domain Controller. When a domain was provisioned with an unpatched Samba version, the ntSecurityDescriptor is simply inherited from Domain/Partition-HEAD-Object instead of being very strict (as on a Windows provisioned domain). This means also non privileged users can use the LDAP_SERVER_SHOW_DELETED_OID control in order to view, the names and preserved attributes of deleted objects.

Mitigation

Update the affected packages:

noarch:
    samba-common-4.17.8-0.amzn2023.0.1.noarch
    samba-pidl-4.17.8-0.amzn2023.0.1.noarch

src:
    samba-4.17.8-0.amzn2023.0.1.src

x86_64:
    samba-test-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-4.17.8-0.amzn2023.0.1.x86_64
    samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-4.17.8-0.amzn2023.0.1.x86_64
    samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-debugsource-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-test-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-4.17.8-0.amzn2023.0.1.x86_64
    samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-4.17.8-0.amzn2023.0.1.x86_64
    samba-tools-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-usershares-4.17.8-0.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

samba: before 4.17.8-0

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-190.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU86856

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-25720

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges within the network.

The vulnerability exists due to create child permissions allows full write access to all attributes. A local user can escalate privileges within the network.

Mitigation

Update the affected packages:

noarch:
    samba-common-4.17.8-0.amzn2023.0.1.noarch
    samba-pidl-4.17.8-0.amzn2023.0.1.noarch

src:
    samba-4.17.8-0.amzn2023.0.1.src

x86_64:
    samba-test-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-4.17.8-0.amzn2023.0.1.x86_64
    samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-4.17.8-0.amzn2023.0.1.x86_64
    samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-debugsource-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-test-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-4.17.8-0.amzn2023.0.1.x86_64
    samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-4.17.8-0.amzn2023.0.1.x86_64
    samba-tools-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-usershares-4.17.8-0.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

samba: before 4.17.8-0

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-190.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU74178

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-0225

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to delete certain attributes.

The vulnerability exists due to improper access restrictions. A remote unprivileged user can delete the "dnsHostname" attribute.

Mitigation

Update the affected packages:

noarch:
    samba-common-4.17.8-0.amzn2023.0.1.noarch
    samba-pidl-4.17.8-0.amzn2023.0.1.noarch

src:
    samba-4.17.8-0.amzn2023.0.1.src

x86_64:
    samba-test-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-4.17.8-0.amzn2023.0.1.x86_64
    samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-4.17.8-0.amzn2023.0.1.x86_64
    samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-debugsource-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-test-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-4.17.8-0.amzn2023.0.1.x86_64
    samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-4.17.8-0.amzn2023.0.1.x86_64
    samba-tools-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-usershares-4.17.8-0.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

samba: before 4.17.8-0

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-190.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper access control

EUVDB-ID: #VU74179

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-0614

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain gain access to sensitive information.

The vulnerability exists due to insufficient patch for vulnerability #VU14335 (CVE-2018-10919). A remote user can bypass implemented security restrictions and gain access to sensitive information.

Mitigation

Update the affected packages:

noarch:
    samba-common-4.17.8-0.amzn2023.0.1.noarch
    samba-pidl-4.17.8-0.amzn2023.0.1.noarch

src:
    samba-4.17.8-0.amzn2023.0.1.src

x86_64:
    samba-test-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-4.17.8-0.amzn2023.0.1.x86_64
    samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-4.17.8-0.amzn2023.0.1.x86_64
    samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-debugsource-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-test-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-4.17.8-0.amzn2023.0.1.x86_64
    samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-4.17.8-0.amzn2023.0.1.x86_64
    samba-tools-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-usershares-4.17.8-0.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

samba: before 4.17.8-0

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-190.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Cleartext transmission of sensitive information

EUVDB-ID: #VU74177

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-0922

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to samba-tool transmits credentials to the LDAP server in clear text. A remote attacker with ability to intercept network traffic can gain access to sensitive data.

Mitigation

Update the affected packages:

noarch:
    samba-common-4.17.8-0.amzn2023.0.1.noarch
    samba-pidl-4.17.8-0.amzn2023.0.1.noarch

src:
    samba-4.17.8-0.amzn2023.0.1.src

x86_64:
    samba-test-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-dc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-4.17.8-0.amzn2023.0.1.x86_64
    samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-tools-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-common-libs-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-4.17.8-0.amzn2023.0.1.x86_64
    samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-debugsource-4.17.8-0.amzn2023.0.1.x86_64
    samba-libs-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-test-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-dcerpc-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-clients-4.17.8-0.amzn2023.0.1.x86_64
    samba-client-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-4.17.8-0.amzn2023.0.1.x86_64
    samba-4.17.8-0.amzn2023.0.1.x86_64
    libsmbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-test-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libnetapi-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-4.17.8-0.amzn2023.0.1.x86_64
    libwbclient-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-dc-libs-4.17.8-0.amzn2023.0.1.x86_64
    samba-ldb-ldap-modules-4.17.8-0.amzn2023.0.1.x86_64
    samba-winbind-krb5-locator-4.17.8-0.amzn2023.0.1.x86_64
    samba-vfs-iouring-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-debuginfo-4.17.8-0.amzn2023.0.1.x86_64
    samba-krb5-printing-4.17.8-0.amzn2023.0.1.x86_64
    samba-tools-4.17.8-0.amzn2023.0.1.x86_64
    python3-samba-devel-4.17.8-0.amzn2023.0.1.x86_64
    samba-usershares-4.17.8-0.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

samba: before 4.17.8-0

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-190.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###