QID 356750

Date Published: 2023-12-06

QID 356750: Amazon Linux Security Advisory for samba : ALAS2-2023-2367

When doing ntlm authentication, the client sends replies to cryptographic challenges back to the server.
These replies have variable length.
Winbind did not properly bounds-check the lan manager response length, which despite the lan manager version no longer being used is still part of the protocol. if the system is running samba's ntlm_auth as authentication backend for services like squid (or a very unusual configuration with freeradius), the vulnarebility is remotely exploitable if not so configured, or to exploit this vulnerability locally, the user must have access to the privileged winbindd unix domain socket (a subdirectory with name 'winbindd_privileged' under "state directory", as set in the smb.conf). this access is normally only given so special system services like squid or freeradius, that use this feature. (
( CVE-2022-2127) smb client can truncate files to 0 bytes by opening files with overwrite disposition when using the acl_xattr samba vfs module with the smb.conf setting "acl_xattr:ignore system acls = yes" (cve-2023-4091)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2367 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356750

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2367 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2367.html