Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4091

Опубликовано: 10 окт. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

Отчет

The vulnerability primarily affects Samba configurations using the "acl_xattr" module with the "acl_xattr:ignore system acls = yes" setting.

Меры по смягчению последствий

The vulnerability is most commonly associated with the "acl_xattr" module and can be mitigated by setting:

"acl_xattr:ignore system acls = no"

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sambaOut of support scope
Red Hat Enterprise Linux 6samba4Out of support scope
Red Hat Enterprise Linux 7sambaOut of support scope
Red Hat Storage 3sambaAffected
Red Hat Enterprise Linux 8sambaFixedRHSA-2023:746722.11.2023
Red Hat Enterprise Linux 8sambaFixedRHSA-2023:746722.11.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportsambaFixedRHSA-2023:740821.11.2023
Red Hat Enterprise Linux 8.8 Extended Update SupportsambaFixedRHSA-2023:746422.11.2023
Red Hat Enterprise Linux 9sambaFixedRHSA-2023:674407.11.2023
Red Hat Enterprise Linux 9sambaFixedRHSA-2023:674407.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-276
https://bugzilla.redhat.com/show_bug.cgi?id=2241882samba: SMB clients can truncate files with read-only permissions

EPSS

Процентиль: 64%
0.00476
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
nvd
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
debian
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB cli ...

suse-cvrf
больше 1 года назад

Security update for samba

CVSS3: 6.5
github
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

EPSS

Процентиль: 64%
0.00476
Низкий

6.5 Medium

CVSS3