FreeBSD Bugzilla – Attachment 243522 Details for
Bug 272638
net/samba416: Update to 4.16.11
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
Patch file for security/vuxml
security_vuxml.samba.patch (text/plain), 6.54 KB, created by
Yasuhiro Kimura
on 2023-07-21 12:00:49 UTC
(
hide
)
Description:
Patch file for security/vuxml
Filename:
MIME Type:
Creator:
Yasuhiro Kimura
Created:
2023-07-21 12:00:49 UTC
Size:
6.54 KB
patch
obsolete
>From 2b77c19059152684b59e0284262bc35ac901918a Mon Sep 17 00:00:00 2001 >From: Yasuhiro Kimura <yasu@FreeBSD.org> >Date: Fri, 21 Jul 2023 18:27:44 +0900 >Subject: [PATCH] security/vuxml: Document multiple vulnerabilities in Samba > >--- > security/vuxml/vuln/2023.xml | 141 +++++++++++++++++++++++++++++++++++ > 1 file changed, 141 insertions(+) > >diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml >index b5441db924c2..7776fa08e0c1 100644 >--- a/security/vuxml/vuln/2023.xml >+++ b/security/vuxml/vuln/2023.xml >@@ -1,3 +1,144 @@ >+ <vuln vid="441e1e1a-27a5-11ee-a156-080027f5fec9"> >+ <topic>samba -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>samba416</name> >+ <range><lt>4.16.11</lt></range> >+ </package> >+ <package> >+ <name>samba413</name> >+ <range><lt>4.13.18</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>The Samba Team reports:</p> >+ <blockquote cite="https://www.samba.org/samba/latest_news.html#4.18.5"> >+ <dl> >+ <dt>CVE-2023-34967: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</dt> >+ <dd> >+ When parsing Spotlight mdssvc RPC packets, one encoded >+ data structure is a key-value style dictionary where the >+ keys are character strings and the values can be any of >+ the supported types in the mdssvc protocol. Due to a >+ lack of type checking in callers of the function >+ dalloc_value_for_key(), which returns the object >+ associated with a key, a caller may trigger a crash in >+ talloc_get_size() when talloc detects that the passed in >+ pointer is not a valid talloc pointer. >+ >+ As RPC worker processes are shared among multiple client >+ connections, a malicious client can crash the worker >+ process affecting all other clients that are also served >+ by this worker. >+ </dd> >+ <dt>CVE-2022-2127: Out-Of-Bounds read in winbind AUTH_CRAP</dt> >+ <dd> >+ When doing NTLM authentication, the client sends replies >+ to cryptographic challenges back to the server. These >+ replies have variable length. Winbind did not properly >+ bounds-check the lan manager response length, which >+ despite the lan manager version no longer being used is >+ still part of the protocol. >+ >+ If the system is running Samba's ntlm_auth as >+ authentication backend for services like Squid (or a >+ very unusual configuration with FreeRADIUS), the >+ vulnarebility is remotely exploitable >+ >+ If not so configured, or to exploit this vulnerability >+ locally, the user must have access to the privileged >+ winbindd UNIX domain socket (a subdirectory with name >+ 'winbindd_privileged' under "state directory", as set in >+ the smb.conf). >+ >+ This access is normally only given so special system >+ services like Squid or FreeRADIUS, that use this >+ feature. >+ </dd> >+ <dt>CVE-2023-34968: Spotlight server-side Share Path Disclosure</dt> >+ <dd> >+ As part of the Spotlight protocol, the initial request >+ returns a path associated with the sharename targeted by >+ the RPC request. Samba returns the real server-side >+ share path at this point, as well as returning the >+ absolute server-side path of results in search queries >+ by clients. >+ >+ Known server side paths could be used to mount >+ subsequent more serious security attacks or could >+ disclose confidential information that is part of the >+ path. >+ >+ To mitigate the issue, Samba will replace the real >+ server-side path with a fake path constructed from the >+ sharename. >+ </dd> >+ <dt>CVE-2023-34966: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</dt> >+ <dd> >+ When parsing Spotlight mdssvc RPC packets sent by the >+ client, the core unmarshalling function sl_unpack_loop() >+ did not validate a field in the network packet that >+ contains the count of elements in an array-like >+ structure. By passing 0 as the count value, the attacked >+ function will run in an endless loop consuming 100% CPU. >+ >+ This bug only affects servers where Spotlight is >+ explicitly enabled globally or on individual shares with >+ "spotlight = yes". >+ </dd> >+ <dt>CVE-2023-3347: SMB2 packet signing not enforced</dt> >+ <dd> >+ SMB2 packet signing is not enforced if an admin >+ configured "server signing = required" or for SMB2 >+ connections to Domain Controllers where SMB2 packet >+ signing is mandatory. >+ >+ SMB2 packet signing is a mechanism that ensures the >+ integrity and authenticity of data exchanged between a >+ client and a server using the SMB2 protocol. >+ >+ It provides protection against certain types of attacks, >+ such as man-in-the-middle attacks, where an attacker >+ intercepts network traffic and modifies the SMB2 >+ messages. >+ >+ Both client and server of an SMB2 connection can require >+ that signing is being used. The server-side setting in >+ Samba to configure signing to be required is "server >+ signing = required". Note that on an Samba AD DCs this >+ is also the default for all SMB2 connections. >+ >+ Unless the client requires signing which would result in >+ signing being used on the SMB2 connection, sensitive >+ data might have been modified by an attacker. >+ >+ Clients connecting to IPC$ on an AD DC will require >+ signed connections being used, so the integrity of these >+ connections was not affected. >+ </dd> >+ </dl> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2023-34967</cvename> >+ <cvename>CVE-2022-2127</cvename> >+ <cvename>CVE-2023-34968</cvename> >+ <cvename>CVE-2023-34966</cvename> >+ <cvename>CVE-2023-3347</cvename> >+ <url>https://www.samba.org/samba/security/CVE-2023-34967.html</url> >+ <url>https://www.samba.org/samba/security/CVE-2022-2127.html</url> >+ <url>https://www.samba.org/samba/security/CVE-2023-34968.html</url> >+ <url>https://www.samba.org/samba/security/CVE-2023-34966.html</url> >+ <url>https://www.samba.org/samba/security/CVE-2023-3347.html</url> >+ </references> >+ <dates> >+ <discovery>2023-07-19</discovery> >+ <entry>2023-07-21</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="2f22927f-26ea-11ee-8290-a8a1599412c6"> > <topic>chromium -- multiple vulnerabilities</topic> > <affects> >-- >2.41.0 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 272638
:
243521
| 243522