• CVE-2023-42669

发布时间: 2023年10月20日

修改时间: 2024年10月31日

概要

A vulnerability was found in Samba s rpcecho development server, a non-Windows RPC server used to test Samba s DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the rpcecho service operates with only one worker in the main RPC task, allowing calls to the rpcecho server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a sleep() call in the dcesrv_echo_TestSleep() function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the rpcecho server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as rpcecho runs in the main RPC task.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 6.5 6.5
Attack Complexity Low Low
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1745 samba security update 2023年10月20日
KylinSec-SA-2023-1750 samba security update 2023年10月20日
KylinSec-SA-2023-1765 samba security update 2023年10月20日
KylinSec-SA-2023-2289 samba security update 2023年10月20日

影响产品

产品 状态
KY3.4-4A samba Fixed
KY3.4-5A samba Fixed
KY3.5.1 samba Fixed
KY3.5.2 samba Fixed