Lucene search

K
sambaSamba SecuritySAMBA:CVE-2020-14318
HistoryOct 29, 2020 - 12:00 a.m.

Missing handle permissions check in SMB1/2/3

2020-10-2900:00:00
Samba Security
www.samba.org
32

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

39.5%

Description

The SMB1/2/3 protocols have a concept of “ChangeNotify”, where a
client can request file name notification on a directory handle when a
condition such as “new file creation” or “file size change” or “file
timestamp update” occurs.

A missing permissions check on a directory handle requesting
ChangeNotify meant that a client with a directory handle open only for
FILE_READ_ATTRIBUTES (minimal access rights) could be used to obtain
change notify replies from the server. These replies contain
information that should not be available to directory handles open for
FILE_READ_ATTRIBUTE only.

Patch Availability

Patches addressing both these issues have been posted to:

https://www.samba.org/samba/security/

Additionally, Samba 4.11.15, 4.12.9 and 4.13.1 have been issued as
security releases to correct the defect. Samba administrators are
advised to upgrade to these releases or apply the patch as soon as
possible.

CVSSv3 calculation

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:O/RC:C/CR:L/MAV:A/MAC:L/MPR:L/MUI:N/MS:U/MC:L/MI:N/MA:N

base score of 4.3 - medium.

Workaround and mitigating factors

As Samba internally opens an underlying file system handle on a
directory when a client requests an open, even for
FILE_READ_ATTRIBUTES then if the underlying file system permissions
don’t allow “r” (read) access for the connected user, then the handle
open request will be denied.

“r” access is the normal permission needed to list or otherwise reveal
the contents of a directory, so if a connected user has “r” access
then they will be able to list the directory contents normally, and
the information received by a ChangeNofity request is already
available to the user.

The security issue occurs if the Administrator or directory owner had
set more restrictive Windows ACL permissions on the directory to
disallow read access to the user, and this permissions change was not
reflected in the underlying file system permissions.

This will only occur if Samba is configured with VFS modules to
decouple the underlying file system permissions from the Windows ACLs,
by setting up a share with the settings:

[vulnerable_share]
vfs_objects = vfs_acl_xattr
acl_xattr:ignore system acls = yes

Credits

Reported by Steven French of Microsoft and the Samba Team.
Advisory written by Jeremy Allison of Google and the Samba Team.
Patches provided by Jeremy Allison of Google and the Samba Team.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

39.5%