CVE-2023-42669
Severity
6.5MEDIUM
EPSS
0.6%
top 31.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 6
Description
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages3 packages
Also affects: Enterprise Linux 8.0, 9.0
🔴Vulnerability Details
4CVEList
▶
OSV▶
CVE-2023-42669: A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements↗2023-11-06
GHSA▶
GHSA-8q58-8vm2-mf3q: A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements↗2023-11-06
📋Vendor Advisories
4Red Hat
▶
Debian▶
CVE-2023-42669: samba - A vulnerability was found in Samba's "rpcecho" development server, a non-Windows...↗2023