CVE-2021-44141

Publication date 31 January 2022

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

4.3 · Medium

Score breakdown

All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.

Read the notes from the security team

Mitigation

This issue can be mitigated by disabling SMB1, which is the default configuration in Samba 4.11 and above. In environments where SMB1 cannot be disabled, symlink support can be disabled with unix extensions = no.

Status

Package Ubuntu Release Status
samba 22.04 LTS jammy Ignored
21.10 impish Ignored
20.04 LTS focal Ignored
18.04 LTS bionic Ignored
16.04 LTS xenial Ignored
14.04 LTS trusty Ignored

Notes


mdeslaur

per upstream, fixing this required a whole rewrite of the VFS layer and there is no reasonable way to fix this in versions older than 4.15.x. Marking this CVE as ignored for older releases.

Severity score breakdown

Parameter Value
Base score 4.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N