All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.samba.org/show_bug.cgi?id=13979 | issue tracking exploit vendor advisory |
https://security.netapp.com/advisory/ntap-20220110-0001/ | third party advisory |
https://www.samba.org/samba/security/CVE-2021-43566.html | patch vendor advisory |