First published: Tue Oct 03 2023(Updated: )
A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | <4.17.12 | |
Samba Samba | >=4.18.0<4.18.8 | |
Samba Samba | >=4.19.0<4.19.1 | |
Fedoraproject Fedora | =39 | |
redhat/samba | <4.19.1 | 4.19.1 |
redhat/samba | <4.18.8 | 4.18.8 |
redhat/samba | <4.17.12 | 4.17.12 |
ubuntu/samba | <2:4.15.13+dfsg-0ubuntu1.5 | 2:4.15.13+dfsg-0ubuntu1.5 |
ubuntu/samba | <2:4.17.7+dfsg-1ubuntu2.3 | 2:4.17.7+dfsg-1ubuntu2.3 |
ubuntu/samba | <2:4.18.6+dfsg-1ubuntu2.1 | 2:4.18.6+dfsg-1ubuntu2.1 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.3+dfsg-1 2:4.21.0~rc1+really4.20.4+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42670 is a vulnerability that allows for Denial of Service (DoS) attacks on Samba AD DC Busy RPC multiple listener.
The affected software versions are Samba 2:4.15.13+dfsg-0ubuntu1.5 and Samba 2:4.17.7+dfsg-1ubuntu2.3.
To fix CVE-2023-42670, update your Samba software to version 2:4.15.13+dfsg-0ubuntu1.5 or version 2:4.17.7+dfsg-1ubuntu2.3.
You can find more information about CVE-2023-42670 on the CVE Mitre website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42670) and the Samba security page (https://www.samba.org/samba/security/CVE-2023-42670.html).
Yes, you can refer to the following security notice for more details: Ubuntu Security Notice USN-6425-1 (https://ubuntu.com/security/notices/USN-6425-1).