QID 356750
Date Published: 2023-12-06
QID 356750: Amazon Linux Security Advisory for samba : ALAS2-2023-2367
When doing ntlm authentication, the client sends replies to cryptographic challenges back to the server.
These replies have variable length.
Winbind did not properly bounds-check the lan manager response length, which despite the lan manager version no longer being used is still part of the protocol. if the system is running samba's ntlm_auth as authentication backend for services like squid (or a very unusual configuration with freeradius), the vulnarebility is remotely exploitable if not so configured, or to exploit this vulnerability locally, the user must have access to the privileged winbindd unix domain socket (a subdirectory with name 'winbindd_privileged' under "state directory", as set in the smb.conf). this access is normally only given so special system services like squid or freeradius, that use this feature. (
( CVE-2022-2127) smb client can truncate files to 0 bytes by opening files with overwrite disposition when using the acl_xattr samba vfs module with the smb.conf setting "acl_xattr:ignore system acls = yes" (cve-2023-4091)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2023-2367 -
alas.aws.amazon.com/AL2/ALAS-2023-2367.html
CVEs related to QID 356750
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2023-2367 | amazon linux 2 |
|