Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3738
HistoryNov 09, 2021 - 12:00 a.m.

CVE-2021-3738

2021-11-0900:00:00
ubuntu.com
ubuntu.com
12
dce/rpc
handle sharing
use-after-free
privilege escalation
samba
database vulnerability
ubuntu 18.04
code backports

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.7%

In DCE/RPC it is possible to share the handles (cookies for resource state)
between multiple connections via a mechanism called ‘association groups’.
These handles can reference connections to our sam.ldb database. However
while the database was correctly shared, the user credentials state was
only pointed at, and when one connection within that association group
ended, the database would be left pointing at an invalid ‘struct
session_info’. The most likely outcome here is a crash, but it is possible
that the use-after-free could instead allow different user state to be
pointed at and this might allow more privileged access.

Bugs

Notes

Author Note
mdeslaur Fixing this in Ubuntu 18.04 LTS would require substantial code backports. We will not be fixing this issue in Ubuntu 18.04 LTS. In environments where this is of concern, we recommend updating to a more recent Ubuntu version.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchsamba< 2:4.13.14+dfsg-0ubuntu0.20.04.1UNKNOWN
ubuntu21.04noarchsamba< 2:4.13.14+dfsg-0ubuntu0.21.04.1UNKNOWN
ubuntu21.10noarchsamba< 2:4.13.14+dfsg-0ubuntu0.21.10.1UNKNOWN
ubuntu22.04noarchsamba< 2:4.13.14+dfsg-0ubuntu1UNKNOWN
ubuntu22.10noarchsamba< 2:4.13.14+dfsg-0ubuntu1UNKNOWN
ubuntu23.04noarchsamba< 2:4.13.14+dfsg-0ubuntu1UNKNOWN

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.7%