QID 355878
QID 355878: Amazon Linux Security Advisory for samba : ALAS2023-2023-316
When doing ntlm authentication, the client sends replies to cryptographic challenges back to the server.
These replies have variable length.
Winbind did not properly bounds-check the lan manager response length, which despite the lan manager version no longer being used is still part of the protocol. if the system is running samba's ntlm_auth as authentication backend for services like squid (or a very unusual configuration with freeradius), the vulnarebility is remotely exploitable if not so configured, or to exploit this vulnerability locally, the user must have access to the privileged winbindd unix domain socket (a subdirectory with name 'winbindd_privileged' under "state directory", as set in the smb.conf). this access is normally only given so special system services like squid or freeradius, that use this feature. (
( CVE-2022-2127) smb2 packet signing not enforced note: https://www.samba.org/samba/security/cve-2023-3347.html (cve-2023-3347) samba spotlight mdssvc rpc request infinite loop denial-of-service vulnerability note: https://www.samba.org/samba/security/cve-2023-34966.html (cve-2023-34966) samba spotlight mdssvc rpc request type confusion denial-of-service vulnerability note: https://www.samba.org/samba/security/cve-2023-34967.html (cve-2023-34967) spotlight server-side share path disclosure note: https://www.samba.org/samba/security/cve-2023-34968.html (cve-2023-34968)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-316 -
alas.aws.amazon.com/AL2023/ALAS-2023-316.html
CVEs related to QID 355878
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-316 | amazon linux 2023 |
|