发布时间: 2023年10月20日
修改时间: 2024年10月31日
A vulnerability was found in Samba s rpcecho development server, a non-Windows RPC server used to test Samba s DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the rpcecho service operates with only one worker in the main RPC task, allowing calls to the rpcecho server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a sleep() call in the dcesrv_echo_TestSleep() function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the rpcecho server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as rpcecho runs in the main RPC task.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 6.5 | 6.5 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1745 | samba security update | 2023年10月20日 |
KylinSec-SA-2023-1750 | samba security update | 2023年10月20日 |
KylinSec-SA-2023-1765 | samba security update | 2023年10月20日 |
KylinSec-SA-2023-2289 | samba security update | 2023年10月20日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | samba | Fixed |
KY3.4-5A | samba | Fixed |
KY3.5.1 | samba | Fixed |
KY3.5.2 | samba | Fixed |