First published: Thu Jul 13 2023(Updated: )
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.15.13+dfsg-0ubuntu0.20.04.3 | 2:4.15.13+dfsg-0ubuntu0.20.04.3 |
ubuntu/samba | <2:4.15.13+dfsg-0ubuntu1.2 | 2:4.15.13+dfsg-0ubuntu1.2 |
ubuntu/samba | <2:4.16.8+dfsg-0ubuntu1.2 | 2:4.16.8+dfsg-0ubuntu1.2 |
ubuntu/samba | <2:4.17.7+dfsg-1ubuntu1.1 | 2:4.17.7+dfsg-1ubuntu1.1 |
ubuntu/samba | <2:4.18.5+dfsg-1ubuntu1 | 2:4.18.5+dfsg-1ubuntu1 |
debian/samba | <=2:4.9.5+dfsg-5+deb10u3<=2:4.9.5+dfsg-5+deb10u4<=2:4.13.13+dfsg-1~deb11u5 | 2:4.17.12+dfsg-0+deb12u1 2:4.19.3+dfsg-2 |
redhat/samba | <4.16.11 | 4.16.11 |
redhat/samba | <4.17.10 | 4.17.10 |
redhat/samba | <4.18.5 | 4.18.5 |
Samba Samba | <4.16.11 | |
Samba Samba | >=4.17.0<4.17.10 | |
Samba Samba | >=4.18.0<4.18.5 | |
Fedoraproject Fedora | =38 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34967 is a Type Confusion vulnerability found in Samba's mdssvc RPC service for Spotlight.
CVE-2023-34967 has a severity rating of 5.3 (medium).
The software affected by CVE-2023-34967 includes Samba versions 2:4.15.13+dfsg-0ubuntu0.20.04.3, 2:4.15.13+dfsg-0ubuntu1.2, 2:4.16.8+dfsg-0ubuntu1.2, 2:4.17.7+dfsg-1ubuntu1.1, 4.16.11, 4.17.10, 4.18.5, and possibly others.
To fix CVE-2023-34967, it is recommended to update to the patched versions of Samba, such as 2:4.17.10+dfsg-0+deb12u1 or 2:4.19.0+dfsg-1.
For more information about CVE-2023-34967, you can visit the following references: [Red Hat](https://access.redhat.com/security/cve/CVE-2023-34967), [Samba](https://www.samba.org/samba/security/CVE-2023-34967.html), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2222794).