๐Ÿ” CVE Alert

CVE-2023-42669

MEDIUM 6.5

Samba: "rpcecho" development server allows denial of service via sleep() call on ad dc

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.

CWE CWE-400
Published Nov 6, 2023
Last Updated Nov 20, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Storage 3
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2023:6209 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:6744 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7371 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7408 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7464 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7467 access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-42669 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2241884 bugzilla.samba.org: https://bugzilla.samba.org/show_bug.cgi?id=15474 samba.org: https://www.samba.org/samba/security/CVE-2023-42669.html security.netapp.com: https://security.netapp.com/advisory/ntap-20231124-0002/