[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251625

 
 

909

 
 

196370

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-316 --- samba

ID: oval:org.secpod.oval:def:19500365Date: (C)2024-01-04   (M)2024-04-29
Class: PATCHFamily: unix




When doing NTLM authentication, the client sends replies tocryptographic challenges back to the server. These replieshave variable length. Winbind did not properly bounds-checkthe lan manager response length, which despite the lanmanager version no longer being used is still part of theprotocol.If the system is running Samba's ntlm_auth as authentication backendfor services like Squid , the vulnarebility is remotely exploitableIf not so configured, or to exploit this vulnerability locally, theuser must have access to the privileged winbindd UNIX domainsocket .This access is normally only given so special system services likeSquid or FreeRADIUS, that use this feature. SMB2 packet signing not enforcedNOTE: https://www.samba.org/samba/security/CVE-2023-3347.html Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service VulnerabilityNOTE: https://www.samba.org/samba/security/CVE-2023-34966.html Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service VulnerabilityNOTE: https://www.samba.org/samba/security/CVE-2023-34967.html Spotlight server-side Share Path DisclosureNOTE: https://www.samba.org/samba/security/CVE-2023-34968.html

Platform:
Amazon Linux 2023
Product:
samba
libnetapi
python3-samba
libsmbclient
libwbclient
Reference:
ALAS2023-2023-316
CVE-2022-2127
CVE-2023-3347
CVE-2023-34966
CVE-2023-34967
CVE-2023-34968
CVE    5
CVE-2023-3347
CVE-2023-34968
CVE-2023-34967
CVE-2022-2127
...
CPE    4
cpe:/a:libsmbclient:libsmbclient
cpe:/a:samba:samba
cpe:/a:python:python3-samba
cpe:/a:libwbclient:libwbclient
...

© SecPod Technologies