Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-4091

Опубликовано: 03 нояб. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.5

Описание

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2:4.18.6+dfsg-1ubuntu2.1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

2:4.15.13+dfsg-0ubuntu0.20.04.6
esm-infra/xenial

needs-triage

focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.6
jammy

released

2:4.15.13+dfsg-0ubuntu1.5
lunar

released

2:4.17.7+dfsg-1ubuntu2.3
mantic

released

2:4.18.6+dfsg-1ubuntu2.1

Показывать по

EPSS

Процентиль: 62%
0.00438
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
почти 2 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
nvd
почти 2 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
debian
почти 2 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB cli ...

suse-cvrf
почти 2 года назад

Security update for samba

CVSS3: 6.5
github
почти 2 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

EPSS

Процентиль: 62%
0.00438
Низкий

6.5 Medium

CVSS3