Synology-SA-19:35 Samba

Publish Time: 2019-10-30 18:23:58 UTC+8

Last Updated: 2022-08-29 14:46:00 UTC+8

Severity
Important
Status
Accepted

Abstract

These vulnerabilities allow remote attackers to bypass security constraints via a susceptible version of DiskStation Manager (DSM), Synology Router Manager (SRM), and allow remote authenticated users to conduct denial-of-service attacks via a susceptible version of Synology Directory Server.

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Important Upgrade to 6.2.3-25423 or above.
SRM 1.2 Important Pending
VS Firmware 2.3 Not affected N/A
Synology Directory Server for DSM 6.2 Moderate Upgrade DSM 6.2 to 6.2.3-25423 or above.

Mitigation

None

Detail

  • CVE-2019-10218

    • Severity: Important
    • CVSS3 Base Score: 8.1
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
    • A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
  • CVE-2019-14847

    • Severity: Moderate
    • CVSS3 Base Score: 4.9
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
    • A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.
  • CVE-2019-14833

    • Severity: Not affected
    • CVSS3 Base Score: 0.0
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
    • A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.

Reference

Revision

Revision Date Description
1 2019-10-30 Initial public release.
2 2019-12-17 Disclosed vulnerability details.
3 2020-04-15 Update for DSM 6.2 and Synology Directory Server for DSM 6.2 is now available in Affected Products.