Korean
<< Back
VID 23324
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description The version of Samba running on the remote host is 3.6.x prior to 4.12.5, 4.13.x prior to 4.13.8, or 4.14.x prior to 4.14.4. It is, therefore, potentially affected by an unauthorized file access flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The flaw can impact data confidentiality and integrity by allowing unauthorized access.

* References:
https://www.samba.org/samba/security/CVE-2021-20254.html
https://www.samba.org/samba/history/security.html

* Platforms Affected:
Samba Project, Samba versions 4.13.x before 4.13.8
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba 4.13.8 or later, available from the Samba Web site at https://www.samba.org/samba/download/
Related URL CVE-2021-20254 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)