Lucene search

K
nvd[email protected]NVD:CVE-2023-4091
HistoryNov 03, 2023 - 8:15 a.m.

CVE-2023-4091

2023-11-0308:15:08
CWE-276
web.nvd.nist.gov
1
samba
vulnerability
file truncation
read-only permissions
smb protocol
samba vfs module

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

7.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.0%

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module “acl_xattr” is configured with “acl_xattr:ignore system acls = yes”. The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba’s permissions.

Affected configurations

NVD
Node
sambasambaRange<4.17.12
OR
sambasambaRange4.18.04.18.8
OR
sambasambaRange4.19.04.19.1
Node
fedoraprojectfedoraMatch39
Node
redhatstorageMatch3.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linux_eusMatch9.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

7.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.0%