Symlink Following Affecting samba-common-libs-debuginfo package, versions <2:4.17.5-0.amzn2023.0.2


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-SAMBACOMMONLIBSDEBUGINFO-3341045
  • published6 Mar 2023
  • disclosed12 Jan 2023

Introduced: 12 Jan 2023

CVE-2022-3592  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 samba-common-libs-debuginfo to version 2:4.17.5-0.amzn2023.0.2 or higher.
This issue was patched in ALAS2023-2023-032.

NVD Description

Note: Versions mentioned in the description apply only to the upstream samba-common-libs-debuginfo package and not the samba-common-libs-debuginfo package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

A symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make 'smbd' escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the 'smbd' configured share path and gain access to another restricted server's filesystem.

CVSS Base Scores

version 3.1