Bug 1215905 (CVE-2023-42669)

Summary: VUL-0: CVE-2023-42669: samba: rpcecho, enabled and running in AD DC, allows blocking sleep on request
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: amach, gabriele.sonnu, meissner, nopower, scabrero, security-team, stoyan.manolov
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/380668/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-42669:6.5:(AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Comment 3 Marcus Meissner 2023-10-10 15:00:40 UTC
https://www.samba.org/samba/security/CVE-2023-42669.html


CVE-2023-42669.html:

===========================================================
== Subject:     "rpcecho" development server allows Denial
                of Service via sleep() call on AD DC
==
== CVE ID#:     CVE-2023-42669
==
== Versions:    All versions of Samba since Samba 4.0.0
==
== Summary:     Calls to the rpcecho server on the AD DC can request
                that the server block for a user-defined amount of
                time, denying service.
===========================================================

===========
Description
===========

Samba developers have built a non-Windows RPC server known as
"rpcecho" to test elements of the Samba DCE/RPC stack under their full
control.

One RPC function provided by "rpcecho" can block, essentially
indefinitely, and because the "rpcecho" service is provided from the
main RPC task, which has only one worker, this denies essentially all
service on the AD DC.

To address this problem, the rpcecho server is removed from our
production binaries and is restricted to selftest builds only.

==================
Patch Availability
==================

Patches addressing both these issues have been posted to:

    https://www.samba.org/samba/security/

Additionally, Samba 4.19.1, 4.18.8 and 4.17.12 have been issued
as security releases to correct the defect.  Samba administrators are
advised to upgrade to these releases or apply the patch as soon
as possible.

==================
CVSSv3 calculation
==================

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (6.5)

==========
Workaround
==========

Setting "dcerpc endpoint servers = -rpcecho" will disable the rpcecho
service on the AD DC.

=======
Credits
=======

Originally reported by Andrew Bartlett of Catalyst and the Samba Team.

Patches provided by Andrew Bartlett of Catalyst and the Samba Team.

Catalyst thanks Planet Innovation for supporting the production of
this security fix.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
Comment 4 Maintenance Automation 2023-10-11 08:35:11 UTC
SUSE-SU-2023:4046-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215904, 1215905, 1215906, 1215907, 1215908
CVE References: CVE-2023-3961, CVE-2023-4091, CVE-2023-4154, CVE-2023-42669, CVE-2023-42670
Sources used:
openSUSE Leap 15.5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
SUSE Linux Enterprise Micro 5.5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
Basesystem Module 15-SP5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
SUSE Linux Enterprise High Availability Extension 15 SP5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Maintenance Automation 2023-10-12 12:46:22 UTC
SUSE-SU-2023:4059-1: An update that solves three vulnerabilities and has one security fix can now be installed.

Category: security (important)
Bug References: 1213940, 1215904, 1215905, 1215908
CVE References: CVE-2023-4091, CVE-2023-4154, CVE-2023-42669
Sources used:
openSUSE Leap 15.4 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
SUSE Linux Enterprise Micro 5.3 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
SUSE Linux Enterprise Micro 5.4 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
Basesystem Module 15-SP4 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1
SUSE Linux Enterprise High Availability Extension 15 SP4 (src): samba-4.15.13+git.691.3d3cea0641-150400.3.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-10-17 16:30:18 UTC
SUSE-SU-2023:4096-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215904, 1215905, 1215908
CVE References: CVE-2023-4091, CVE-2023-4154, CVE-2023-42669
Sources used:
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Manager Proxy 4.2 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Manager Retail Branch Server 4.2 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Manager Server 4.2 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Enterprise Storage 7.1 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise Micro 5.2 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise High Availability Extension 15 SP3 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): samba-4.15.13+git.691.3d3cea0641-150300.3.63.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.