Amazon Linux AMI update for samba



Published: 2021-01-14 | Updated: 2024-01-07
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2020-14318
CVE-2020-14323
CVE-2020-1472
CWE-ID CWE-264
CWE-476
Exploitation vector Network
Public exploit Vulnerability #3 is being exploited in the wild.
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU47990

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-14318

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to the way "ChangeNotify" concept for SMB1/2/3 protocols was implemented in Samba. A missing permissions check on a directory handle requesting ChangeNotify means that a client with a directory handle open only for FILE_READ_ATTRIBUTES (minimal access rights) could be used to obtain change notify replies from the server. These replies contain information that should not be available to directory handles open for FILE_READ_ATTRIBUTE only. A local unprivileged user can abuse this lack of permissions check to obtain information about file changes.

Mitigation

Update the affected packages:

i686:
    samba-client-4.10.16-9.56.amzn1.i686
    samba-libs-4.10.16-9.56.amzn1.i686
    samba-common-libs-4.10.16-9.56.amzn1.i686
    ctdb-4.10.16-9.56.amzn1.i686
    libwbclient-4.10.16-9.56.amzn1.i686
    samba-client-libs-4.10.16-9.56.amzn1.i686
    samba-debuginfo-4.10.16-9.56.amzn1.i686
    libsmbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-modules-4.10.16-9.56.amzn1.i686
    samba-python-test-4.10.16-9.56.amzn1.i686
    samba-krb5-printing-4.10.16-9.56.amzn1.i686
    samba-devel-4.10.16-9.56.amzn1.i686
    libsmbclient-4.10.16-9.56.amzn1.i686
    samba-python-4.10.16-9.56.amzn1.i686
    samba-4.10.16-9.56.amzn1.i686
    samba-winbind-4.10.16-9.56.amzn1.i686
    samba-test-libs-4.10.16-9.56.amzn1.i686
    samba-common-tools-4.10.16-9.56.amzn1.i686
    libwbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-clients-4.10.16-9.56.amzn1.i686
    ctdb-tests-4.10.16-9.56.amzn1.i686
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.i686
    samba-test-4.10.16-9.56.amzn1.i686

noarch:
    samba-pidl-4.10.16-9.56.amzn1.noarch
    samba-common-4.10.16-9.56.amzn1.noarch

src:
    samba-4.10.16-9.56.amzn1.src

x86_64:
    samba-winbind-modules-4.10.16-9.56.amzn1.x86_64
    libwbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-4.10.16-9.56.amzn1.x86_64
    samba-client-4.10.16-9.56.amzn1.x86_64
    samba-common-tools-4.10.16-9.56.amzn1.x86_64
    samba-client-libs-4.10.16-9.56.amzn1.x86_64
    libwbclient-4.10.16-9.56.amzn1.x86_64
    samba-test-4.10.16-9.56.amzn1.x86_64
    samba-python-4.10.16-9.56.amzn1.x86_64
    ctdb-4.10.16-9.56.amzn1.x86_64
    samba-winbind-clients-4.10.16-9.56.amzn1.x86_64
    samba-devel-4.10.16-9.56.amzn1.x86_64
    libsmbclient-4.10.16-9.56.amzn1.x86_64
    samba-krb5-printing-4.10.16-9.56.amzn1.x86_64
    samba-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-4.10.16-9.56.amzn1.x86_64
    samba-test-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.x86_64
    libsmbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-python-test-4.10.16-9.56.amzn1.x86_64
    samba-debuginfo-4.10.16-9.56.amzn1.x86_64
    samba-common-libs-4.10.16-9.56.amzn1.x86_64
    ctdb-tests-4.10.16-9.56.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2021-1469.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU47991

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-14323

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when processing requests in winbind in Samba. A remote user can send specially crafted request to winbind daemon, trigger a NULL pointer dereference error and crash it.

Mitigation

Update the affected packages:

i686:
    samba-client-4.10.16-9.56.amzn1.i686
    samba-libs-4.10.16-9.56.amzn1.i686
    samba-common-libs-4.10.16-9.56.amzn1.i686
    ctdb-4.10.16-9.56.amzn1.i686
    libwbclient-4.10.16-9.56.amzn1.i686
    samba-client-libs-4.10.16-9.56.amzn1.i686
    samba-debuginfo-4.10.16-9.56.amzn1.i686
    libsmbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-modules-4.10.16-9.56.amzn1.i686
    samba-python-test-4.10.16-9.56.amzn1.i686
    samba-krb5-printing-4.10.16-9.56.amzn1.i686
    samba-devel-4.10.16-9.56.amzn1.i686
    libsmbclient-4.10.16-9.56.amzn1.i686
    samba-python-4.10.16-9.56.amzn1.i686
    samba-4.10.16-9.56.amzn1.i686
    samba-winbind-4.10.16-9.56.amzn1.i686
    samba-test-libs-4.10.16-9.56.amzn1.i686
    samba-common-tools-4.10.16-9.56.amzn1.i686
    libwbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-clients-4.10.16-9.56.amzn1.i686
    ctdb-tests-4.10.16-9.56.amzn1.i686
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.i686
    samba-test-4.10.16-9.56.amzn1.i686

noarch:
    samba-pidl-4.10.16-9.56.amzn1.noarch
    samba-common-4.10.16-9.56.amzn1.noarch

src:
    samba-4.10.16-9.56.amzn1.src

x86_64:
    samba-winbind-modules-4.10.16-9.56.amzn1.x86_64
    libwbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-4.10.16-9.56.amzn1.x86_64
    samba-client-4.10.16-9.56.amzn1.x86_64
    samba-common-tools-4.10.16-9.56.amzn1.x86_64
    samba-client-libs-4.10.16-9.56.amzn1.x86_64
    libwbclient-4.10.16-9.56.amzn1.x86_64
    samba-test-4.10.16-9.56.amzn1.x86_64
    samba-python-4.10.16-9.56.amzn1.x86_64
    ctdb-4.10.16-9.56.amzn1.x86_64
    samba-winbind-clients-4.10.16-9.56.amzn1.x86_64
    samba-devel-4.10.16-9.56.amzn1.x86_64
    libsmbclient-4.10.16-9.56.amzn1.x86_64
    samba-krb5-printing-4.10.16-9.56.amzn1.x86_64
    samba-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-4.10.16-9.56.amzn1.x86_64
    samba-test-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.x86_64
    libsmbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-python-test-4.10.16-9.56.amzn1.x86_64
    samba-debuginfo-4.10.16-9.56.amzn1.x86_64
    samba-common-libs-4.10.16-9.56.amzn1.x86_64
    ctdb-tests-4.10.16-9.56.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2021-1469.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU45628

Risk: High

CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2020-1472

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Netlogon. A remote non-authenticated attacker can use MS-NRPC to connect to a domain controller to obtain domain administrator access. This vulnerability was dubbed ZeroLogon.

Mitigation

Update the affected packages:

i686:
    samba-client-4.10.16-9.56.amzn1.i686
    samba-libs-4.10.16-9.56.amzn1.i686
    samba-common-libs-4.10.16-9.56.amzn1.i686
    ctdb-4.10.16-9.56.amzn1.i686
    libwbclient-4.10.16-9.56.amzn1.i686
    samba-client-libs-4.10.16-9.56.amzn1.i686
    samba-debuginfo-4.10.16-9.56.amzn1.i686
    libsmbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-modules-4.10.16-9.56.amzn1.i686
    samba-python-test-4.10.16-9.56.amzn1.i686
    samba-krb5-printing-4.10.16-9.56.amzn1.i686
    samba-devel-4.10.16-9.56.amzn1.i686
    libsmbclient-4.10.16-9.56.amzn1.i686
    samba-python-4.10.16-9.56.amzn1.i686
    samba-4.10.16-9.56.amzn1.i686
    samba-winbind-4.10.16-9.56.amzn1.i686
    samba-test-libs-4.10.16-9.56.amzn1.i686
    samba-common-tools-4.10.16-9.56.amzn1.i686
    libwbclient-devel-4.10.16-9.56.amzn1.i686
    samba-winbind-clients-4.10.16-9.56.amzn1.i686
    ctdb-tests-4.10.16-9.56.amzn1.i686
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.i686
    samba-test-4.10.16-9.56.amzn1.i686

noarch:
    samba-pidl-4.10.16-9.56.amzn1.noarch
    samba-common-4.10.16-9.56.amzn1.noarch

src:
    samba-4.10.16-9.56.amzn1.src

x86_64:
    samba-winbind-modules-4.10.16-9.56.amzn1.x86_64
    libwbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-4.10.16-9.56.amzn1.x86_64
    samba-client-4.10.16-9.56.amzn1.x86_64
    samba-common-tools-4.10.16-9.56.amzn1.x86_64
    samba-client-libs-4.10.16-9.56.amzn1.x86_64
    libwbclient-4.10.16-9.56.amzn1.x86_64
    samba-test-4.10.16-9.56.amzn1.x86_64
    samba-python-4.10.16-9.56.amzn1.x86_64
    ctdb-4.10.16-9.56.amzn1.x86_64
    samba-winbind-clients-4.10.16-9.56.amzn1.x86_64
    samba-devel-4.10.16-9.56.amzn1.x86_64
    libsmbclient-4.10.16-9.56.amzn1.x86_64
    samba-krb5-printing-4.10.16-9.56.amzn1.x86_64
    samba-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-4.10.16-9.56.amzn1.x86_64
    samba-test-libs-4.10.16-9.56.amzn1.x86_64
    samba-winbind-krb5-locator-4.10.16-9.56.amzn1.x86_64
    libsmbclient-devel-4.10.16-9.56.amzn1.x86_64
    samba-python-test-4.10.16-9.56.amzn1.x86_64
    samba-debuginfo-4.10.16-9.56.amzn1.x86_64
    samba-common-libs-4.10.16-9.56.amzn1.x86_64
    ctdb-tests-4.10.16-9.56.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2021-1469.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###