A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2023:6667 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7139 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0423 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0580 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-34968 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2222795 - Issue Tracking, Third Party Advisory | |
References | () https://www.samba.org/samba/security/CVE-2023-34968.html - Vendor Advisory |
16 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Dec 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
First Time |
Debian debian Linux
Debian |
|
References | () https://access.redhat.com/errata/RHSA-2023:6667 - Third Party Advisory | |
References | (MISC) https://security.netapp.com/advisory/ntap-20230731-0010/ - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7139 - Third Party Advisory | |
References | (MISC) https://www.debian.org/security/2023/dsa-5477 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/ - Mailing List |
14 Nov 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Aug 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jul 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | NVD-CWE-noinfo | |
First Time |
Redhat
Fedoraproject Fedoraproject fedora Redhat enterprise Linux Samba Redhat storage Samba samba |
|
References |
|
|
References | (MISC) https://www.samba.org/samba/security/CVE-2023-34968.html - Vendor Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2222795 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-34968 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/ - Mailing List |
22 Jul 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-20 15:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-34968
Mitre link : CVE-2023-34968
CVE.ORG link : CVE-2023-34968
JSON object : View
Products Affected
redhat
- storage
- enterprise_linux
samba
- samba
fedoraproject
- fedora
debian
- debian_linux
CWE