Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-6744

Опубликовано: 16 нояб. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-6744: samba security update (MODERATE)

[4.18.6-101]

  • resolves: RHEL-11937 Fix CVE-2023-3961 - smbd must check the pipename
  • resolves: RHEL-11937 Fix CVE-2023-4091 - SMB clients can truncate files
  • resolves: RHEL-11937 Fix CVE-2023-42669 - Remove rpcecho server

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libnetapi

4.18.6-101.el9_3

libnetapi-devel

4.18.6-101.el9_3

libsmbclient

4.18.6-101.el9_3

libsmbclient-devel

4.18.6-101.el9_3

libwbclient

4.18.6-101.el9_3

libwbclient-devel

4.18.6-101.el9_3

python3-samba

4.18.6-101.el9_3

python3-samba-dc

4.18.6-101.el9_3

python3-samba-devel

4.18.6-101.el9_3

python3-samba-test

4.18.6-101.el9_3

samba

4.18.6-101.el9_3

samba-client

4.18.6-101.el9_3

samba-client-libs

4.18.6-101.el9_3

samba-common

4.18.6-101.el9_3

samba-common-libs

4.18.6-101.el9_3

samba-common-tools

4.18.6-101.el9_3

samba-dc-libs

4.18.6-101.el9_3

samba-dcerpc

4.18.6-101.el9_3

samba-devel

4.18.6-101.el9_3

samba-krb5-printing

4.18.6-101.el9_3

samba-ldb-ldap-modules

4.18.6-101.el9_3

samba-libs

4.18.6-101.el9_3

samba-pidl

4.18.6-101.el9_3

samba-test

4.18.6-101.el9_3

samba-test-libs

4.18.6-101.el9_3

samba-tools

4.18.6-101.el9_3

samba-usershares

4.18.6-101.el9_3

samba-vfs-iouring

4.18.6-101.el9_3

samba-winbind

4.18.6-101.el9_3

samba-winbind-clients

4.18.6-101.el9_3

samba-winbind-krb5-locator

4.18.6-101.el9_3

samba-winbind-modules

4.18.6-101.el9_3

Oracle Linux x86_64

libnetapi

4.18.6-101.el9_3

libnetapi-devel

4.18.6-101.el9_3

libsmbclient

4.18.6-101.el9_3

libsmbclient-devel

4.18.6-101.el9_3

libwbclient

4.18.6-101.el9_3

libwbclient-devel

4.18.6-101.el9_3

python3-samba

4.18.6-101.el9_3

python3-samba-dc

4.18.6-101.el9_3

python3-samba-devel

4.18.6-101.el9_3

python3-samba-test

4.18.6-101.el9_3

samba

4.18.6-101.el9_3

samba-client

4.18.6-101.el9_3

samba-client-libs

4.18.6-101.el9_3

samba-common

4.18.6-101.el9_3

samba-common-libs

4.18.6-101.el9_3

samba-common-tools

4.18.6-101.el9_3

samba-dc-libs

4.18.6-101.el9_3

samba-dcerpc

4.18.6-101.el9_3

samba-devel

4.18.6-101.el9_3

samba-krb5-printing

4.18.6-101.el9_3

samba-ldb-ldap-modules

4.18.6-101.el9_3

samba-libs

4.18.6-101.el9_3

samba-pidl

4.18.6-101.el9_3

samba-test

4.18.6-101.el9_3

samba-test-libs

4.18.6-101.el9_3

samba-tools

4.18.6-101.el9_3

samba-usershares

4.18.6-101.el9_3

samba-vfs-iouring

4.18.6-101.el9_3

samba-winbind

4.18.6-101.el9_3

samba-winbind-clients

4.18.6-101.el9_3

samba-winbind-krb5-locator

4.18.6-101.el9_3

samba-winbind-modules

4.18.6-101.el9_3

samba-winexe

4.18.6-101.el9_3

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2023-7467: samba security update (MODERATE)

suse-cvrf
больше 1 года назад

Security update for samba

CVSS3: 7.5
redos
больше 1 года назад

Множественные уязвимости samba

CVSS3: 9.1
ubuntu
больше 1 года назад

A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.

CVSS3: 9.1
redhat
больше 1 года назад

A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.

Уязвимость ELSA-2023-6744