CVE-2021-44141
Publication date 31 January 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.
Mitigation
This issue can be mitigated by disabling SMB1, which is the default configuration in Samba 4.11 and above. In environments where SMB1 cannot be disabled, symlink support can be disabled with unix extensions = no.
Status
Package | Ubuntu Release | Status |
---|---|---|
samba | 22.04 LTS jammy | Ignored |
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Ignored |
Notes
mdeslaur
per upstream, fixing this required a whole rewrite of the VFS layer and there is no reasonable way to fix this in versions older than 4.15.x. Marking this CVE as ignored for older releases.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |