安全公告/【CVE-2023-34966】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:高危
影响源码包:samba
CVSS评分:7.5
发现日期:2023-08-30
修复版本:samba-4.11.12-30

漏洞描述

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

修复方式

yum update PackageName

漏洞判定

执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://gitee.com/src-openeuler/samba/issues/I7MH2R
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
https://nvd.nist.gov/vuln/detail/CVE-2023-34966