6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.1 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
52.0%
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module “acl_xattr” is configured with “acl_xattr:ignore system acls = yes”. The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba’s permissions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | 3.17-main | noarch | samba | = 4.16.11-r0 | UNKNOWN |
Alpine | 3.16-main | noarch | samba | = 4.15.13-r0 | UNKNOWN |
Alpine | 3.15-main | noarch | samba | = 4.15.13-r0 | UNKNOWN |
Alpine | edge-main | noarch | samba | < 4.18.8-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | samba | < 4.18.8-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | samba | < 4.18.8-r0 | UNKNOWN |
Alpine | 3.20-main | noarch | samba | < 4.18.8-r0 | UNKNOWN |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.1 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
52.0%