Bug 2241883 (CVE-2023-4154)

Summary: CVE-2023-4154 samba: AD DC password exposure to privileged users and RODCs
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: nobody, pfilipen, rhs-smb, security-response-team, stefano.biagiotti
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: samba 4.19.1, samba 4.18.8, samba 4.17.12 Doc Type: If docs needed, set a value
Doc Text:
A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2243230    
Bug Blocks: 2228383    

Description TEJ RATHI 2023-10-03 07:34:33 UTC
An RODC and a user with the GET_CHANGES right can view all attributes, including secrets and passwords. In Samba's implementation of the DirSync control, Active Directory accounts authorized to do some replication, but not to replicate sensitive attributes, can instead replicate critical domain passwords and secrets.

In a default installation, this means that RODC DC accounts (which should only be permitted to replicate some passwords) can instead obtain all domain secrets, including the core AD secret: the krbtgt password.

https://bugzilla.samba.org/show_bug.cgi?id=15424

Comment 1 TEJ RATHI 2023-10-11 10:42:42 UTC
This CVE is now Public:
https://www.samba.org/samba/security/CVE-2023-4154.html

Comment 2 TEJ RATHI 2023-10-11 10:46:07 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 2243230]