Vulnerability Name:

CVE-2021-43566 (CCN-217058)

Assigned:2021-11-09
Published:2021-11-09
Updated:2022-10-14
Summary:All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
CVSS v3 Severity:2.5 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)
2.2 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
2.6 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)
2.3 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
2.6 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)
2.3 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:1.2 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
1.4 Low (CCN CVSS v2 Vector: AV:A/AC:H/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-362
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2021-43566

Source: MISC
Type: Exploit, Issue Tracking, Vendor Advisory
https://bugzilla.samba.org/show_bug.cgi?id=13979

Source: XF
Type: UNKNOWN
samba-cve202143566-sec-bypass(217058)

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220110-0001/

Source: CCN
Type: IBM Security Bulletin 6560396 (i)
IBM i is vulnerable to bypass security restrictions due to Samba SMB1 (CVE-2021-43566 and CVE-2021-44141)

Source: CCN
Type: IBM Security Bulletin 6575377 (Spectrum Scale)
A vulnerability in Samba affects IBM Spectrum Scale SMB protocol access method (CVE-2021-43566)

Source: CCN
Type: Samba Web site
Symlink race error can allow directory creation outside of the exported share

Source: MISC
Type: Patch, Vendor Advisory
https://www.samba.org/samba/security/CVE-2021-43566.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:samba:samba:*:*:*:*:*:*:*:* (Version < 4.13.16)

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:samba:samba:4.13.0:-:*:*:*:*:*:*
  • AND
  • cpe:/o:ibm:i:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_scale:5.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:6156
    P
    Security update for samba (Critical)
    2022-02-14
    oval:org.opensuse.security:def:4303
    P
    Security update for samba (Critical)
    2022-02-14
    oval:org.opensuse.security:def:5339
    P
    Security update for samba (Critical)
    2022-02-14
    oval:org.opensuse.security:def:1757
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:102146
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:99206
    P
    (Critical)
    2022-02-08
    oval:org.opensuse.security:def:935
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:100410
    P
    (Critical)
    2022-02-08
    oval:org.opensuse.security:def:42332
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:102246
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:99480
    P
    (Critical)
    2022-02-08
    oval:org.opensuse.security:def:1586
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:100744
    P
    (Critical)
    2022-02-08
    oval:org.opensuse.security:def:102309
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:99742
    P
    (Critical)
    2022-02-08
    oval:org.opensuse.security:def:1685
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:101627
    P
    Security update for samba (Critical)
    2022-02-08
    oval:org.opensuse.security:def:100072
    P
    (Critical)
    2022-02-08
    oval:com.redhat.rhba:def:20214438
    P
    RHBA-2021:4438: samba bug fix and enhancement update (Low)
    2021-11-09
    BACK
    samba samba *
    samba samba 4.13.0 -
    ibm i 7.3
    ibm i 7.4
    ibm spectrum scale 5.1.0