
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-3961 is a path traversal vulnerability identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. The vulnerability was discovered in July 2023 and affects Samba versions starting from 4.16.0. The issue exists in Samba's mechanism for connecting SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS (Samba Security, NVD).
The vulnerability stems from inadequate sanitization of incoming client pipe names, allowing a client to send pipe names containing Unix directory traversal characters (../). When Samba processes these pipe names, it connects them to Unix domain sockets within a private directory. Due to the insufficient validation, clients could send pipe names that resolve to Unix domain sockets outside the private directory. The connection to these sockets is made with root privileges, bypassing filesystem permissions (Samba Security).
If successfully exploited, an attacker could potentially gain unauthorized access to Unix domain sockets outside the intended private directory. Since the connections are made with root privileges, this could lead to unauthorized access to services, potential service compromises, or service crashes. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (NVD).
The vulnerability has been fixed in Samba versions 4.19.1, 4.18.8, and 4.17.12. The fix involves proper sanitization of client pipe names to prevent directory traversal. No workarounds were available, and administrators were advised to upgrade to the patched versions as soon as possible (Samba Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."