CVE-2023-34967

Updated: 2024-09-16 21:22:55.83065

Description:

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.3

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS samba 3.6.23 5.3 MEDIUM Ignored 2023-08-01 03:38:12
CentOS 7 ELS samba 4.10.16 5.3 MEDIUM Ignored 2024-06-25 11:20:13
CentOS 8.4 ELS samba 4.13.3-5 5.3 MEDIUM Released CLSA-2024:1723483357 2024-08-12 14:42:27
CentOS 8.5 ELS samba 4.14.5-7 5.3 MEDIUM Released CLSA-2024:1723058766 2024-08-07 17:45:33
CloudLinux 6 ELS samba 3.6.23 5.3 MEDIUM Ignored 2023-08-01 03:38:12
Oracle Linux 6 ELS samba 3.6.23 5.3 MEDIUM Ignored 2023-08-01 03:38:12
Ubuntu 16.04 ELS samba 4.3.11 5.3 MEDIUM Ignored 2023-08-01 03:38:12
Ubuntu 18.04 ELS samba 4.7.6 5.3 MEDIUM Ignored 2023-08-01 03:38:12