A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-4154 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241883 | Issue Tracking |
https://bugzilla.samba.org/show_bug.cgi?id=15424 | Issue Tracking Patch |
https://security.netapp.com/advisory/ntap-20231124-0002/ | |
https://www.samba.org/samba/security/CVE-2023-4154.html | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2023-4154 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241883 | Issue Tracking |
https://bugzilla.samba.org/show_bug.cgi?id=15424 | Issue Tracking Patch |
https://security.netapp.com/advisory/ntap-20231124-0002/ | |
https://www.samba.org/samba/security/CVE-2023-4154.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2023-4154 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2241883 - Issue Tracking | |
References | () https://bugzilla.samba.org/show_bug.cgi?id=15424 - Issue Tracking, Patch | |
References | () https://security.netapp.com/advisory/ntap-20231124-0002/ - | |
References | () https://www.samba.org/samba/security/CVE-2023-4154.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
24 Nov 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Nov 2023, 15:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CPE | cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* | |
First Time |
Samba samba
Samba |
|
References | () https://www.samba.org/samba/security/CVE-2023-4154.html - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2241883 - Issue Tracking | |
References | () https://access.redhat.com/security/cve/CVE-2023-4154 - Third Party Advisory | |
References | () https://bugzilla.samba.org/show_bug.cgi?id=15424 - Issue Tracking, Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
07 Nov 2023, 21:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-07 20:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4154
Mitre link : CVE-2023-4154
CVE.ORG link : CVE-2023-4154
JSON object : View
Products Affected
samba
- samba
CWE
CWE-787
Out-of-bounds Write