First published: Tue Oct 17 2023(Updated: )
USN-6425-1 fixed vulnerabilities in Samba. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: Sri Nagasubramanian discovered that the Samba acl_xattr VFS module incorrectly handled read-only files. When Samba is configured to ignore system ACLs, a remote attacker could possibly use this issue to truncate read-only files. (CVE-2023-4091) Andrew Bartlett discovered that Samba incorrectly handled the DirSync control. A remote attacker with an RODC DC account could possibly use this issue to obtain all domain secrets. (CVE-2023-4154) Andrew Bartlett discovered that Samba incorrectly handled the rpcecho development server. A remote attacker could possibly use this issue to cause Samba to stop responding, resulting in a denial of service. (CVE-2023-42669) Kirin van der Veer discovered that Samba incorrectly handled certain RPC service listeners. A remote attacker could possibly use this issue to cause Samba to start multiple incompatible RPC listeners, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-42670)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/samba | <2:4.18.6+dfsg-1ubuntu2.1 | 2:4.18.6+dfsg-1ubuntu2.1 |
=23.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID is USN-6425-3.
The title of the vulnerability is 'Samba vulnerabilities'.
The affected software is Samba version 2:4.18.6+dfsg-1ubuntu2.1 on Ubuntu 23.10.
Yes, the update version 2:4.18.6+dfsg-1ubuntu2.1 provides the corresponding fixes.
You can find more information about the vulnerability at the following references: [Link 1](https://ubuntu.com/security/CVE-2023-42669), [Link 2](https://ubuntu.com/security/CVE-2023-4091), [Link 3](https://ubuntu.com/security/CVE-2023-4154).