![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-42669 |
Description: | A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.885141 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-42669 RHBZ#2241884 https://bugzilla.redhat.com/show_bug.cgi?id=2241884 RHSA-2023:6209 https://access.redhat.com/errata/RHSA-2023:6209 RHSA-2023:6744 https://access.redhat.com/errata/RHSA-2023:6744 RHSA-2023:7371 https://access.redhat.com/errata/RHSA-2023:7371 RHSA-2023:7408 https://access.redhat.com/errata/RHSA-2023:7408 RHSA-2023:7464 https://access.redhat.com/errata/RHSA-2023:7464 RHSA-2023:7467 https://access.redhat.com/errata/RHSA-2023:7467 https://access.redhat.com/security/cve/CVE-2023-42669 https://access.redhat.com/security/cve/CVE-2023-42669 https://bugzilla.samba.org/show_bug.cgi?id=15474 https://bugzilla.samba.org/show_bug.cgi?id=15474 https://security.netapp.com/advisory/ntap-20231124-0002/ https://security.netapp.com/advisory/ntap-20231124-0002/ https://www.samba.org/samba/security/CVE-2023-42669.html https://www.samba.org/samba/security/CVE-2023-42669.html |