CVE-2023-42669
Detail
This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
Description
A vulnerability was found in Samba’s “rpcecho” development server, a non-Windows RPC server used to test Samba’s DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the “rpcecho” service operates with only one worker in the main RPC task, allowing calls to the “rpcecho” server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a “sleep()” call in the “dcesrv_echo_TestSleep()” function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the “rpcecho” server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as “rpcecho” runs in the main RPC task.
Metrics
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected].
| URL | Source(s) | Tag(s) |
|---|---|---|
|
https://access.redhat.com/errata/RHSA-2023:6209 |
CVE, Inc., Red Hat |
Third Party Advisory |
|
https://access.redhat.com/errata/RHSA-2023:6744 |
CVE, Inc., Red Hat |
Third Party Advisory |
|
https://access.redhat.com/errata/RHSA-2023:7371 |
CVE, Inc., Red Hat |
|
|
https://access.redhat.com/errata/RHSA-2023:7408 |
CVE, Inc., Red Hat |
|
|
https://access.redhat.com/errata/RHSA-2023:7464 |
CVE, Inc., Red Hat |
|
|
https://access.redhat.com/errata/RHSA-2023:7467 |
CVE, Inc., Red Hat |
|
|
https://access.redhat.com/security/cve/CVE-2023-42669 |
CVE, Inc., Red Hat |
Third Party Advisory |
|
https://bugzilla.redhat.com/show_bug.cgi?id=2241884 |
CVE, Inc., Red Hat |
Issue Tracking |
|
https://bugzilla.samba.org/show_bug.cgi?id=15474 |
CVE, Inc., Red Hat |
Issue Tracking |
|
https://security.netapp.com/advisory/ntap-20231124-0002/ |
CVE |
|
|
https://www.samba.org/samba/security/CVE-2023-42669.html |
CVE, Inc., Red Hat |
Vendor Advisory |
Weakness Enumeration
| CWE-ID | CWE Name | Source |
|---|---|---|
|
NVD-CWE-noinfo |
Insufficient Information |
NIST |
|
CWE-400 |
Uncontrolled Resource Consumption |
Red Hat, Inc. |
Quick Info
CVE Dictionary Entry:
CVE-2023-42669
NVD
Published Date:
11/06/2023
NVD
Last Modified:
11/21/2024
Source:
Red Hat, Inc.
Comments are closed