Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14318

Опубликовано: 29 окт. 2020
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

A flaw was found in the way Samba handled file and directory permissions. This flaw allows an authenticated user to gain access to certain file and directory information, which otherwise would be unavailable. The highest threat from this vulnerability is to confidentiality.

Меры по смягчению последствий

As Samba internally opens an underlying file system handle on a directory when a client requests an open, even for FILE_READ_ATTRIBUTES then if the underlying file system permissions don't allow "r" (read) access for the connected user, then the handle open request will be denied. "r" access is the normal permission needed to list or otherwise reveal the contents of a directory, so if a connected user has "r" access then they will be able to list the directory contents normally, and the information received by a ChangeNofity request is already available to the user. The security issue occurs if the Administrator or directory owner had set more restrictive Windows ACL permissions on the directory to disallow read access to the user, and this permissions change was not reflected in the underlying file system permissions. This will only occur if Samba is configured with VFS modules to decouple the underlying file system permissions from the Windows ACLs, by setting up a share with the settings: [vulnerable_share] vfs_objects = vfs_acl_xattr acl_xattr:ignore system acls = yes

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sambaOut of support scope
Red Hat Enterprise Linux 7sambaFixedRHSA-2020:543915.12.2020
Red Hat Enterprise Linux 8openchangeFixedRHSA-2021:164718.05.2021
Red Hat Enterprise Linux 8sambaFixedRHSA-2021:164718.05.2021
Red Hat Enterprise Linux 8openchangeFixedRHSA-2021:164718.05.2021
Red Hat Enterprise Linux 8sambaFixedRHSA-2021:164718.05.2021
Red Hat Gluster Storage 3.5 for RHEL 7sambaFixedRHSA-2021:372305.10.2021
Red Hat Gluster Storage 3.5 for RHEL 8sambaFixedRHBA-2021:150305.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=1892631samba: Missing handle permissions check in SMB1/2/3 ChangeNotify

EPSS

Процентиль: 41%
0.00189
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 4 лет назад

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

CVSS3: 4.3
nvd
больше 4 лет назад

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

CVSS3: 4.3
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 4.3
debian
больше 4 лет назад

A flaw was found in the way samba handled file and directory permissio ...

CVSS3: 4.3
github
около 3 лет назад

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

EPSS

Процентиль: 41%
0.00189
Низкий

4.3 Medium

CVSS3