2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-44142" ,
2023-11-07 21:03:21 +00:00
"sourceIdentifier" : "secalert@redhat.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2022-02-21T15:15:07.380" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:39:33.470" ,
2023-09-17 10:00:28 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root."
} ,
{
"lang" : "es" ,
"value" : "El m\u00f3dulo vfs_fruit de Samba usa atributos de archivo extendidos (EA, xattr) para proporcionar \"...compatibilidad mejorada con los clientes SMB de Apple e interoperabilidad con un servidor de archivos AFP de Netatalk 3\". Samba versiones anteriores a 4.13.17, 4.14.12 y 4.15.5 con vfs_fruit configurado permiten una lectura y escritura fuera de l\u00edmites de la pila por medio de atributos de archivo extendidos especialmente dise\u00f1ados. Un atacante remoto con acceso de escritura a los atributos de archivo extendidos puede ejecutar c\u00f3digo arbitrario con los privilegios de smbd, t\u00edpicamente root"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 9.0
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
} ,
{
2024-04-04 08:46:00 +00:00
"source" : "secalert@redhat.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.13.17" ,
"matchCriteriaId" : "D7E470E9-2683-48E5-B8F0-02BBDC7F3231"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.14.0" ,
"versionEndExcluding" : "4.14.12" ,
"matchCriteriaId" : "4E57F9C0-2EA0-4485-B018-665139BA3F42"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.15.0" ,
"versionEndExcluding" : "4.15.5" ,
"matchCriteriaId" : "24842378-D0A4-49CC-B4AF-8A1FC74427F8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "815D70A8-47D3-459C-A32C-9FEACA0659D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "902B8056-9E37-443B-8905-8AA93E2447FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.2" ,
"versionEndExcluding" : "6.2.4-25556.4" ,
"matchCriteriaId" : "D6095F8A-383B-46F9-ABBF-74783500B6F1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A930E247-0B43-43CB-98FF-6CE7B8189835"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80E516C0-98A4-4ADE-B69F-66A772E2BAAA"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CD81C46-328B-412D-AF4E-68A2AD2F1A73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "135265D8-583D-41EB-B741-419FC871CE91"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB28F9AF-3D06-4532-B397-96D7E4792503"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "831F0F47-3565-4763-B16F-C87B1FF2035E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E3F09B5-569F-4C58-9FCA-3C0953D107B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "566507B6-AC95-47F7-A3FB-C6F414E45F51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87C21FE1-EA5C-498F-9C6C-D05F91A88217"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0AB105EC-19F9-424A-86F1-305A6FD74A9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47811209-5CE5-4375-8391-B0A7F6A0E420"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "983533DD-3970-4A37-9A9C-582BD48AA1E5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "37CE1DC7-72C5-483C-8921-0B462C8284D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F66BE726-A258-42D7-B23A-925F50FDF449"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58A2A898-C4C2-4670-8A0D-274F7CE6E460"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6897676D-53F9-45B3-B27F-7FF9A4C58D33"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E28F226A-CBC7-4A32-BE58-398FA5B42481"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B09ACF2D-D83F-4A86-8185-9569605D8EE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC10D919-57FD-4725-B8D2-39ECB476902F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48C2E003-A71C-4D06-B8B3-F93160568182"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3921C1CF-A16D-4727-99AD-03EFFA7C91CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC6DD887-9744-43EA-8B3C-44C6B6339590"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://bugzilla.samba.org/show_bug.cgi?id=14914" ,
2023-11-07 21:03:21 +00:00
"source" : "secalert@redhat.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://kb.cert.org/vuls/id/119678" ,
2023-11-07 21:03:21 +00:00
"source" : "secalert@redhat.com"
2023-04-24 12:24:31 +02:00
} ,
2023-09-17 10:00:28 +00:00
{
"url" : "https://security.gentoo.org/glsa/202309-06" ,
2023-11-07 21:03:21 +00:00
"source" : "secalert@redhat.com"
2023-09-17 10:00:28 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "https://www.samba.org/samba/security/CVE-2021-44142.html" ,
2023-11-07 21:03:21 +00:00
"source" : "secalert@redhat.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" ,
2023-11-07 21:03:21 +00:00
"source" : "secalert@redhat.com"
2023-04-24 12:24:31 +02:00
}
]
}