![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-42670 |
Description: | A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.885141 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-42670 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/ RHBZ#2241885 https://bugzilla.redhat.com/show_bug.cgi?id=2241885 https://access.redhat.com/security/cve/CVE-2023-42670 https://access.redhat.com/security/cve/CVE-2023-42670 https://bugzilla.samba.org/show_bug.cgi?id=15473 https://bugzilla.samba.org/show_bug.cgi?id=15473 https://www.samba.org/samba/security/CVE-2023-42670.html https://www.samba.org/samba/security/CVE-2023-42670.html |