Описание
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
Меры по смягчению последствий
As a possible workaround, disable Spotlight by removing all configuration stanzas ("spotlight=yes|true") that enable Spotlight .
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | samba | Out of support scope | ||
Red Hat Enterprise Linux 6 | samba4 | Out of support scope | ||
Red Hat Enterprise Linux 7 | samba | Out of support scope | ||
Red Hat Storage 3 | samba | Affected | ||
Red Hat Enterprise Linux 8 | samba | Fixed | RHSA-2023:7139 | 14.11.2023 |
Red Hat Enterprise Linux 8 | samba | Fixed | RHSA-2023:7139 | 14.11.2023 |
Red Hat Enterprise Linux 8.6 Extended Update Support | samba | Fixed | RHSA-2024:0423 | 25.01.2024 |
Red Hat Enterprise Linux 8.8 Extended Update Support | samba | Fixed | RHSA-2024:0580 | 30.01.2024 |
Red Hat Enterprise Linux 9 | samba | Fixed | RHSA-2023:6667 | 07.11.2023 |
Red Hat Enterprise Linux 9 | samba | Fixed | RHSA-2023:6667 | 07.11.2023 |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
A Type Confusion vulnerability was found in Samba's mdssvc RPC service ...
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
Уязвимость функции dalloc_value_for_key() пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
5.3 Medium
CVSS3