Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU59345
Risk: Low
CVSSv3.1: 2.3 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43566
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to a symlink race condition when creating directories. A remote authenticated user can use SMB1 or NFS symlink race to create directories on the Unix filesystem outside of the share definition.
Successful exploitation of the vulnerability requites that the user has permissions to create folder in the target directory.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 20.03 LTS SP3
samba-vfs-glusterfs: before 4.11.12-9
samba-pidl: before 4.11.12-9
samba-dc-provision: before 4.11.12-9
libwbclient-devel: before 4.11.12-9
samba-winbind-clients: before 4.11.12-9
samba-client: before 4.11.12-9
libsmbclient: before 4.11.12-9
samba-winbind-krb5-locator: before 4.11.12-9
python3-samba-dc: before 4.11.12-9
samba-krb5-printing: before 4.11.12-9
samba-winbind: before 4.11.12-9
samba-help: before 4.11.12-9
samba-dc: before 4.11.12-9
python3-samba-test: before 4.11.12-9
samba-winbind-modules: before 4.11.12-9
samba-test: before 4.11.12-9
samba-common: before 4.11.12-9
samba-dc-bind-dlz: before 4.11.12-9
samba-debugsource: before 4.11.12-9
libwbclient: before 4.11.12-9
samba-debuginfo: before 4.11.12-9
samba-common-tools: before 4.11.12-9
ctdb: before 4.11.12-9
python3-samba: before 4.11.12-9
samba-libs: before 4.11.12-9
ctdb-tests: before 4.11.12-9
samba-devel: before 4.11.12-9
libsmbclient-devel: before 4.11.12-9
samba: before 4.11.12-9
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1507
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.