7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.027 Low
EPSS
Percentile
90.4%
Medium
Canonical Ubuntu
It was discovered that Samba incorrectly handled Winbind NTLM authentication responses. An attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service. (CVE-2022-2127) Andreas Schneider discovered that Samba incorrectly enforced SMB2 packet signing. A remote attacker could possibly use this issue to obtain or modify sensitive information. This issue only affected Ubuntu 23.04. (CVE-2023-3347) Florent Saudel and Arnaud Gatignolof discovered that Samba incorrectly handled certain Spotlight requests. A remote attacker could possibly use this issue to cause Samba to consume resources, leading to a denial of service. (CVE-2023-34966, CVE-2023-34967) Ralph Boehme and Stefan Metzmacher discovered that Samba incorrectly handled paths returned by Spotlight requests. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-34968) Update Instructions: Run sudo pro fix USN-6238-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwbclient-dev – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba – 2:4.15.13+dfsg-0ubuntu0.20.04.3 libnss-winbind – 2:4.15.13+dfsg-0ubuntu0.20.04.3 libpam-winbind – 2:4.15.13+dfsg-0ubuntu0.20.04.3 libsmbclient – 2:4.15.13+dfsg-0ubuntu0.20.04.3 ctdb – 2:4.15.13+dfsg-0ubuntu0.20.04.3 smbclient – 2:4.15.13+dfsg-0ubuntu0.20.04.3 libwbclient0 – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-testsuite – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-common-bin – 2:4.15.13+dfsg-0ubuntu0.20.04.3 winbind – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-dsdb-modules – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-dev – 2:4.15.13+dfsg-0ubuntu0.20.04.3 libsmbclient-dev – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-vfs-modules – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-common – 2:4.15.13+dfsg-0ubuntu0.20.04.3 registry-tools – 2:4.15.13+dfsg-0ubuntu0.20.04.3 samba-libs – 2:4.15.13+dfsg-0ubuntu0.20.04.3 python3-samba – 2:4.15.13+dfsg-0ubuntu0.20.04.3 No subscription required
CVEs contained in this USN include: CVE-2022-2127, CVE-2023-3347, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2023-08-10: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
cflinuxfs4 | lt | 1.23.0 | |
cf deployment | lt | 31.4.0 |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.027 Low
EPSS
Percentile
90.4%