Уязвимость CVE-2023-42669: Информация

Описание

A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.

Важность: MEDIUM (6,5) Вектор: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Опубликовано: 6 ноября 2023 г.
Изменено: 24 ноября 2023 г.

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
sambasisyphus4.17.12-alt14.20.1-alt2ALT-PU-2023-6448-1332020Исправлено
sambasisyphus_e2k4.17.12-alt14.20.1-alt1ALT-PU-2023-6495-1-Исправлено
sambasisyphus_riscv644.17.12-alt14.20.1-alt2ALT-PU-2023-6523-1-Исправлено
sambap104.17.12-alt34.19.6-alt2ALT-PU-2023-7794-2332201Исправлено
sambap10_e2k4.17.12-alt34.19.6-alt2ALT-PU-2023-7914-1-Исправлено
sambac9f24.16.11-alt0.c9.24.14.14-alt0.c9.1ALT-PU-2024-8331-1336563В работе
sambap114.17.12-alt14.20.1-alt1ALT-PU-2023-6448-1332020Исправлено

Ссылки на рекомендации, решения и инструменты

    1. Конфигурация 1

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      Start including
      4.19.0
      End excliding
      4.19.1

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      Start including
      4.18.0
      End excliding
      4.18.8

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      Start including
      4.0.0
      End excliding
      4.17.12

      Конфигурация 2

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*