Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-4091
HistoryNov 03, 2023 - 8:15 a.m.

CVE-2023-4091

2023-11-0308:15:08
Debian Security Bug Tracker
security-tracker.debian.org
27
cve-2023-4091
samba
smb clients
file truncation
read-only permissions
vfs module
acl_xattr
overwrite create
kernel file system
permissions

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

46.4%

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module “acl_xattr” is configured with “acl_xattr:ignore system acls = yes”. The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba’s permissions.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba< 2:4.17.12+dfsg-0+deb12u1samba_2:4.17.12+dfsg-0+deb12u1_all.deb
Debian11allsamba< 2:4.13.13+dfsg-1~deb11u6samba_2:4.13.13+dfsg-1~deb11u6_all.deb
Debian999allsamba< 2:4.19.1+dfsg-1samba_2:4.19.1+dfsg-1_all.deb
Debian13allsamba< 2:4.19.1+dfsg-1samba_2:4.19.1+dfsg-1_all.deb

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

46.4%