Ad dc 密码暴露给特权用户和 rodc (CVE-2023-4154)

admin 2023-11-29 18:21:21 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Ad dc 密码暴露给特权用户和 rodc (CVE-2023-4154)

CVE编号

CVE-2023-4154

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-11-08
漏洞描述
A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://access.redhat.com/security/cve/CVE-2023-4154
https://bugzilla.redhat.com/show_bug.cgi?id=2241883
https://bugzilla.samba.org/show_bug.cgi?id=15424
https://security.netapp.com/advisory/ntap-20231124-0002/
https://www.samba.org/samba/security/CVE-2023-4154.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 samba samba * From (including) 4.0.0 Up to (excluding) 4.17.12
运行在以下环境
应用 samba samba * From (including) 4.18.0 Up to (excluding) 4.18.8
运行在以下环境
应用 samba samba * From (including) 4.19.0 Up to (excluding) 4.19.1
运行在以下环境
系统 alpine_3.18 samba * Up to (excluding) 4.18.8-r0
运行在以下环境
系统 alpine_edge samba * Up to (excluding) 4.18.8-r0
运行在以下环境
系统 anolis_os_23 samba-vfs-iouring * Up to (excluding) 4.18.8-1
运行在以下环境
系统 debian_10 samba * Up to (including) 4.9.5+dfsg-5+deb10u3
运行在以下环境
系统 debian_11 samba * Up to (including) 4.13.13+dfsg-1~deb11u5
运行在以下环境
系统 debian_12 samba * Up to (excluding) 2:4.17.12+dfsg-0+deb12u1
运行在以下环境
系统 debian_sid samba * Up to (excluding) 2:4.19.1+dfsg-1
运行在以下环境
系统 fedora_37 samba-client-debuginfo * Up to (excluding) 4.17.12-1.fc37
运行在以下环境
系统 fedora_38 samba-client-debuginfo * Up to (excluding) 4.18.8-1.fc38
运行在以下环境
系统 fedora_39 samba-client-debuginfo * Up to (excluding) 4.19.2-1.fc39
运行在以下环境
系统 opensuse_Leap_15.4 samba-ceph * Up to (excluding) 4.15.13
运行在以下环境
系统 opensuse_Leap_15.5 samba-ceph * Up to (excluding) 4.17.9
运行在以下环境
系统 ubuntu_20.04 samba * Up to (excluding) 2:4.15.13+dfsg-0ubuntu0.20.04.6
运行在以下环境
系统 ubuntu_22.04 samba * Up to (excluding) 2:4.15.13+dfsg-0ubuntu1.5
阿里云评分 6.2
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-787 跨界内存写
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0