Lucene search

K
archlinuxArchLinuxASA-202009-17
HistorySep 29, 2020 - 12:00 a.m.

[ASA-202009-17] samba: access restriction bypass

2020-09-2900:00:00
security.archlinux.org
46
samba
access restriction
upgrade
vulnerability
schannel
attacker
domain controller
administrator access
cve-2020-1472
arch linux

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.422

Percentile

97.4%

Arch Linux Security Advisory ASA-202009-17

Severity: Medium
Date : 2020-09-29
CVE-ID : CVE-2020-1472
Package : samba
Type : access restriction bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-1236

Summary

The package samba before version 4.13.0-1 is vulnerable to access
restriction bypass.

Resolution

Upgrade to 4.13.0-1.

pacman -Syu “samba>=4.13.0-1”

The problem has been fixed upstream in version 4.13.0.

Workaround

Ensure you do not have an schannel directive and if you do make sure
it’s either = yes or = auto.

Description

A flaw was found in the Microsoft Windows Netlogon Remote Protocol (MS-
NRPC), where it reuses a known, static, zero-value initialization
vector (IV) in AES-CFB8 mode. This flaw allows an unauthenticated
attacker to impersonate a domain-joined computer, including a domain
controller, and possibly obtain domain administrator privileges. The
highest threat from this vulnerability is to confidentiality,
integrity, as well as system availability.

Impact

An unauthenticated attacker can gain administrator access through
crafted traffic, if the samba server is configured to run with a
vulnerable schannel directive.

References

https://bugs.archlinux.org/task/67983
https://www.samba.org/samba/security/CVE-2020-1472.html
https://security.archlinux.org/CVE-2020-1472

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanysamba< 4.13.0-1UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.422

Percentile

97.4%