Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-4091

Опубликовано: 03 нояб. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 6.5

Описание

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2:4.18.6+dfsg-1ubuntu2.1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

2:4.15.13+dfsg-0ubuntu0.20.04.6
esm-infra/xenial

needs-triage

focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.6
jammy

released

2:4.15.13+dfsg-0ubuntu1.5
lunar

released

2:4.17.7+dfsg-1ubuntu2.3
mantic

released

2:4.18.6+dfsg-1ubuntu2.1

Показывать по

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
nvd
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

CVSS3: 6.5
debian
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB cli ...

suse-cvrf
больше 1 года назад

Security update for samba

CVSS3: 6.5
github
больше 1 года назад

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.

6.5 Medium

CVSS3

Уязвимость CVE-2023-4091