An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:6667 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:7139 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:0423 | |
https://access.redhat.com/errata/RHSA-2024:0580 | |
https://access.redhat.com/errata/RHSA-2024:4101 | |
https://access.redhat.com/security/cve/CVE-2023-34966 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2222793 | Issue Tracking Third Party Advisory |
https://www.samba.org/samba/security/CVE-2023-34966 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
16 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Dec 2023, 22:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2023:6667 - Third Party Advisory | |
References | (MISC) https://security.netapp.com/advisory/ntap-20230731-0010/ - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7139 - Third Party Advisory | |
References | (MISC) https://www.debian.org/security/2023/dsa-5477 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/ - Mailing List | |
CPE | cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
First Time |
Debian debian Linux
Debian |
14 Nov 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Aug 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jul 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jul 2023, 17:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject
Fedoraproject fedora Redhat enterprise Linux Samba Redhat Samba samba |
|
CPE | cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-835 | |
References | (MISC) https://www.samba.org/samba/security/CVE-2023-34966 - Vendor Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2222793 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-34966 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/ - Mailing List |
22 Jul 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-20 15:15
Updated : 2024-09-16 13:15
NVD link : CVE-2023-34966
Mitre link : CVE-2023-34966
CVE.ORG link : CVE-2023-34966
JSON object : View
Products Affected
debian
- debian_linux
samba
- samba
redhat
- enterprise_linux
fedoraproject
- fedora
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')