The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
References
Link | Resource |
---|---|
https://www.samba.org/samba/security/CVE-2021-44142.html | Mitigation Vendor Advisory |
https://kb.cert.org/vuls/id/119678 | Patch Third Party Advisory |
https://bugzilla.samba.org/show_bug.cgi?id=14914 | Issue Tracking Patch Vendor Advisory |
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2022-02-21 07:15
Updated : 2022-02-23 07:47
NVD link : CVE-2021-44142
Mitre link : CVE-2021-44142
JSON object : View
Products Affected
canonical
- ubuntu_linux
redhat
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_update_services_for_sap_solutions
- virtualization_host
- enterprise_linux
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_for_scientific_computing
- codeready_linux_builder
- gluster_storage
- enterprise_linux_resilient_storage
- enterprise_linux_desktop
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_big_endian
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
fedoraproject
- fedora
samba
- samba
debian
- debian_linux
synology
- diskstation_manager