CVE-2023-3961
Severity
9.8CRITICAL
EPSS
1.9%
top 16.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 3
Latest updateJan 15
Description
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB cli…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:HExploitability: 3.9 | Impact: 5.2
Affected Packages3 packages
Also affects: Fedora 39, Enterprise Linux 8.0, 9.0
🔴Vulnerability Details
3CVEList
▶
GHSA▶
GHSA-8m6h-6qw7-f6cg: A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory↗2023-11-03
OSV▶
CVE-2023-3961: A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory↗2023-11-03