Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-34967
HistoryJul 20, 2023 - 2:57 p.m.

CVE-2023-34967

2023-07-2014:57:45
Debian Security Bug Tracker
security-tracker.debian.org
17
type confusion
samba
mdssvc rpc
spotlight
rpc packets
type checking
dalloc_value_for_key
talloc_get_size
rpc worker process
shared
malicious client

0.027 Low

EPSS

Percentile

90.4%

A Type Confusion vulnerability was found in Samba’s mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba< 2:4.17.10+dfsg-0+deb12u1samba_2:4.17.10+dfsg-0+deb12u1_all.deb
Debian11allsamba< 2:4.13.13+dfsg-1~deb11u6samba_2:4.13.13+dfsg-1~deb11u6_all.deb
Debian10allsamba<= 2:4.9.5+dfsg-5+deb10u3samba_2:4.9.5+dfsg-5+deb10u3_all.deb
Debian999allsamba< 2:4.18.5+dfsg-1samba_2:4.18.5+dfsg-1_all.deb
Debian13allsamba< 2:4.18.5+dfsg-1samba_2:4.18.5+dfsg-1_all.deb