CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
61.7%
In DCE/RPC it is possible to share the handles (cookies for resource state)
between multiple connections via a mechanism called ‘association groups’.
These handles can reference connections to our sam.ldb database. However
while the database was correctly shared, the user credentials state was
only pointed at, and when one connection within that association group
ended, the database would be left pointing at an invalid ‘struct
session_info’. The most likely outcome here is a crash, but it is possible
that the use-after-free could instead allow different user state to be
pointed at and this might allow more privileged access.
Author | Note |
---|---|
mdeslaur | Fixing this in Ubuntu 18.04 LTS would require substantial code backports. We will not be fixing this issue in Ubuntu 18.04 LTS. In environments where this is of concern, we recommend updating to a more recent Ubuntu version. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu | 21.04 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu0.21.04.1 | UNKNOWN |
ubuntu | 21.10 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu0.21.10.1 | UNKNOWN |
ubuntu | 22.04 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu1 | UNKNOWN |
ubuntu | 22.10 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu1 | UNKNOWN |
ubuntu | 23.04 | noarch | samba | < 2:4.13.14+dfsg-0ubuntu1 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
61.7%