Samba SMB Truncation via acl_xattr despite Read-Only
CVE-2023-4091 Published on November 3, 2023
Samba: smb clients can truncate files with read-only permissions
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
Vulnerability Analysis
CVE-2023-4091 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.
Timeline
Reported to Red Hat.
Made public. 7 days later.
Weakness Type
Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.
Products Associated with CVE-2023-4091
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-4091 are published in these products:
Affected Versions
Red Hat Enterprise Linux 8:- Version 0:4.18.6-2.el8_9 and below * is unaffected.
- Version 0:4.18.6-2.el8_9 and below * is unaffected.
- Version 0:4.15.5-13.el8_6 and below * is unaffected.
- Version 0:4.17.5-4.el8_8 and below * is unaffected.
- Version 0:4.18.6-101.el9_3 and below * is unaffected.
- Version 0:4.18.6-101.el9_3 and below * is unaffected.
- Version 0:4.15.5-111.el9_0 and below * is unaffected.
- Version 0:4.17.5-104.el9_2 and below * is unaffected.
- Version 0:4.15.5-13.el8_6 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.