Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310104662
HistoryMar 31, 2023 - 12:00 a.m.

Samba Incomplete Access Check Vulnerability (CVE-2023-0225)

2023-03-3100:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
7
vulnerability
access check
samba
update
unprivileged users
directory

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.003

Percentile

67.8%

Samba is prone to an incomplete access check vulnerability.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:samba:samba";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.104662");
  script_version("2023-10-13T05:06:10+0000");
  script_tag(name:"last_modification", value:"2023-10-13 05:06:10 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-03-31 09:52:43 +0000 (Fri, 31 Mar 2023)");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-04-09 02:50:00 +0000 (Sun, 09 Apr 2023)");

  script_cve_id("CVE-2023-0225");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Samba Incomplete Access Check Vulnerability (CVE-2023-0225)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("smb_nativelanman.nasl", "gb_samba_detect.nasl");
  script_mandatory_keys("samba/smb_or_ssh/detected");

  script_tag(name:"summary", value:"Samba is prone to an incomplete access check vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"An incomplete access check on dnsHostName allows authenticated
  but otherwise unprivileged users to delete this attribute from any object in the directory.");

  script_tag(name:"affected", value:"Samba 4.17.0 and later versions.");

  script_tag(name:"solution", value:"Update to version 4.17.7, 4.18.1 or later.");

  script_xref(name:"URL", value:"https://www.samba.org/samba/security/CVE-2023-0225.html");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range_exclusive(version: version, test_version_lo: "4.17.0", test_version_up: "4.17.7")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.17.7 / 4.18.1", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_is_equal(version: version, test_version: "4.18.0")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.18.1", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.003

Percentile

67.8%