QID 355878

QID 355878: Amazon Linux Security Advisory for samba : ALAS2023-2023-316

When doing ntlm authentication, the client sends replies to cryptographic challenges back to the server.
These replies have variable length.
Winbind did not properly bounds-check the lan manager response length, which despite the lan manager version no longer being used is still part of the protocol. if the system is running samba's ntlm_auth as authentication backend for services like squid (or a very unusual configuration with freeradius), the vulnarebility is remotely exploitable if not so configured, or to exploit this vulnerability locally, the user must have access to the privileged winbindd unix domain socket (a subdirectory with name 'winbindd_privileged' under "state directory", as set in the smb.conf). this access is normally only given so special system services like squid or freeradius, that use this feature. (
( CVE-2022-2127) smb2 packet signing not enforced note: https://www.samba.org/samba/security/cve-2023-3347.html (cve-2023-3347) samba spotlight mdssvc rpc request infinite loop denial-of-service vulnerability note: https://www.samba.org/samba/security/cve-2023-34966.html (cve-2023-34966) samba spotlight mdssvc rpc request type confusion denial-of-service vulnerability note: https://www.samba.org/samba/security/cve-2023-34967.html (cve-2023-34967) spotlight server-side share path disclosure note: https://www.samba.org/samba/security/cve-2023-34968.html (cve-2023-34968)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-316 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-316 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-316.html