Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-44141

Published: 31 January 2022

All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.

Notes

Author Note
mdeslaur
per upstream, fixing this required a whole rewrite of the VFS
layer and there is no reasonable way to fix this in versions
older than 4.15.x. Marking this CVE as ignored for older
releases.

Mitigation

This issue can be mitigated by disabling SMB1, which is the default
configuration in Samba 4.11 and above. In environments where SMB1 cannot
be disabled, symlink support can be disabled with unix extensions = no.

Priority

Low

Cvss 3 Severity Score

4.3

Score breakdown

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
bionic Ignored

focal Ignored

impish Ignored

jammy Ignored

trusty Ignored

upstream
Released (4.15.4)
xenial Ignored

Severity score breakdown

Parameter Value
Base score 4.3
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N