Synology-SA-19:35 Samba

Publish Time: 2019-10-30 18:23:58 UTC+8

Last Updated: 2020-04-15 18:52:23 UTC+8

Severity
Important
Status
Ongoing

Abstract

These vulnerabilities allow remote attackers to bypass security constraints via a susceptible version of DiskStation Manager (DSM), Synology Router Manager (SRM), and allow remote authenticated users to conduct denial-of-service attacks via a susceptible version of Synology Directory Server.

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Important Upgrade to 6.2.3-25423 or above.
SkyNAS Important Ongoing
VS960HD Not affected N/A
SRM 1.2 Not affected N/A
Synology Directory Server Moderate Upgrade DSM to 6.2.3-25423 or above.

Mitigation

None

Detail

  • CVE-2019-10218

    • Severity: Moderate
    • CVSS3 Base Score: 8.1
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
    • A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
  • CVE-2019-14833

    • Severity: Not affected
    • CVSS3 Base Score: 0.0
    • CVSS3 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
    • A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.
  • CVE-2019-14847

    • Severity: Moderate
    • CVSS3 Base Score: 4.9
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
    • A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.

Reference

Revision

Revision Date Description
1 2019-10-30 Initial public release.
2 2019-12-17 Disclosed vulnerability details.
3 2020-04-15 Update for DSM 6.2 and Synology Directory Server are now available in Affected Products.