CVE-2023-4154
07.11.2023, 20:15
A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.Enginsight
Vendor | Product | Version |
---|---|---|
samba | samba | 4.0.0 ≤ 𝑥 < 4.17.12 |
samba | samba | 4.18.0 ≤ 𝑥 < 4.18.8 |
samba | samba | 4.19.0 ≤ 𝑥 < 4.19.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
samba |
|
Common Weakness Enumeration
References