Bug 1215906 (CVE-2023-42670) - VUL-0: CVE-2023-42670: samba: The procedure number is out of range when starting Active Directory The procedure number is out of range when starting Active Directory Users and ComputersUsers and Computers
Summary: VUL-0: CVE-2023-42670: samba: The procedure number is out of range when start...
Status: RESOLVED FIXED
Alias: CVE-2023-42670
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: SUSE Samba Team
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/380670/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-42670:6.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-03 13:19 UTC by Marcus Meissner
Modified: 2023-11-13 14:40 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 4 Marcus Meissner 2023-10-10 15:01:19 UTC
https://www.samba.org/samba/security/CVE-2023-42670.html

 
CVE-2023-42670.html:

===========================================================
== Subject:     Samba AD DC Busy RPC multiple listener DoS
==
== CVE ID#:     CVE-2023-42670
==
== Versions:    All versions of Samba since Samba 4.16
==
== Summary:     Samba can be made to start multiple incompatible RPC
                listeners, disrupting service on the AD DC.
===========================================================

===========
Description
===========

Samba as an Active Directory DC operates RPC services from two
distinct parts of the codebase.  Those services focused on the AD DC
are started in the main "samba" process, while services focused on the
fileserver and NT4-like DC are started from the new samba-dcerpcd,
which is launched on-demand from the fileserver (smbd) tasks.

When starting, samba-dcerpcd must first confirm which services not to
provide, so as to avoid duplicate listeners.

The issue in this advisory is that, when Samba's RPC server is under
load, or otherwise not responding, the servers NOT built for the
AD DC (eg build instead for the NT4-emulation "classic DCs") can be
incorrectly started, and compete to listen on the same unix domain
sockets.

This then results in some queries being answered by the AD DC, and
some not.  This has been seen in production at multiple sites, as "The
procedure number is out of range" when starting Active Directory Users
and Computers tool, however it can also be triggered maliciously, to
prevent service on the AD DC.

==================
Patch Availability
==================

Patches addressing both these issues have been posted to:

    https://www.samba.org/samba/security/

Additionally, Samba 4.19.1, 4.18.8 and 4.17.12 have been issued
as security releases to correct the defect.  Samba administrators are
advised to upgrade to these releases or apply the patch as soon
as possible.

==================
CVSSv3 calculation
==================

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (6.5)

==========
Workaround
==========

Setting "rpc start on demand helpers = no" in the smb.conf will
disable the file-server based RPC servers entirely.  While used less
often, these services are required so this is not a long-term solution.

=======
Credits
=======

Originally reported by Kirin van der Veer of Planet Innovation and
diagnosed by Andrew Bartlett of Catalyst and the Samba Team.

Patches provided by Andrew Bartlett of Catalyst and the Samba Team.

Catalyst thanks Planet Innovation for supporting the production of
this security fix.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
Comment 5 Maintenance Automation 2023-10-11 08:35:11 UTC
SUSE-SU-2023:4046-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215904, 1215905, 1215906, 1215907, 1215908
CVE References: CVE-2023-3961, CVE-2023-4091, CVE-2023-4154, CVE-2023-42669, CVE-2023-42670
Sources used:
openSUSE Leap 15.5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
SUSE Linux Enterprise Micro 5.5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
Basesystem Module 15-SP5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1
SUSE Linux Enterprise High Availability Extension 15 SP5 (src): samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.