Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-34967: Access of Resource Using Incompatible Type ('Type Confusion') in Red Hat Red Hat Enterprise Linux 8

0
Medium
VulnerabilityCVE-2023-34967cvecve-2023-34967
Published: Thu Jul 20 2023 (07/20/2023, 14:57:45 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.

AI-Powered Analysis

AILast updated: 11/20/2025, 17:38:02 UTC

Technical Analysis

CVE-2023-34967 is a type confusion vulnerability identified in the Samba mdssvc RPC service component used for Spotlight functionality on Red Hat Enterprise Linux 8. The vulnerability stems from improper type validation when callers invoke the dalloc_value_for_key() function to retrieve values from a key-value dictionary encoded in the mdssvc RPC packets. This dictionary allows keys as character strings and values of various supported types. Due to a lack of type checking, a caller may receive a pointer that is not a valid talloc pointer, which causes the talloc_get_size() function to crash when it attempts to determine the size of the memory allocation. The mdssvc RPC service uses worker processes shared among multiple client connections. An attacker can exploit this flaw by sending specially crafted RPC packets that trigger the crash in the shared worker process, resulting in denial of service for all clients connected to that worker. The vulnerability does not allow for code execution, privilege escalation, or data leakage, but it impacts availability by causing process crashes. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. Although no known exploits have been reported in the wild, the flaw requires attention due to the potential for service disruption in environments using Samba Spotlight on Red Hat Enterprise Linux 8. The CVSS v3.1 base score is 5.3, reflecting network attack vector, low complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, and low availability impact limited to denial of service.

Potential Impact

For European organizations, the primary impact of CVE-2023-34967 is denial of service affecting systems running Red Hat Enterprise Linux 8 with Samba Spotlight enabled. This can disrupt file sharing and indexing services that rely on the mdssvc RPC service, potentially impacting business operations that depend on these functionalities. Critical infrastructure and enterprises using these systems for centralized file access or search capabilities may experience service outages or degraded performance. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect productivity and operational continuity. Organizations with multi-tenant environments or shared services are particularly vulnerable as a single malicious client can cause crashes affecting multiple users. The lack of authentication requirement means the attack surface includes any network-exposed Samba Spotlight service, increasing risk if proper network segmentation or firewall rules are not in place. Given the medium severity, organizations should assess their exposure and prioritize remediation to prevent potential denial of service attacks that could disrupt critical services.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the type confusion flaw in the Samba mdssvc RPC service. 2. Until patches are deployed, restrict network access to the Samba Spotlight mdssvc RPC service using firewalls or network segmentation to limit exposure to trusted clients only. 3. Monitor network traffic for unusual or malformed RPC packets targeting the mdssvc service to detect potential exploitation attempts. 4. Implement rate limiting or connection throttling on RPC services to reduce the impact of potential denial of service attacks. 5. Regularly audit and update Samba and related components to ensure all security updates are applied promptly. 6. Consider disabling Spotlight or the mdssvc RPC service if it is not required in your environment to eliminate the attack surface. 7. Maintain robust incident response plans to quickly recover from service disruptions caused by exploitation attempts. 8. Use host-based intrusion detection systems to monitor for crashes or abnormal process terminations related to the mdssvc RPC worker processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-06-07T21:11:04.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f519438b88f02b51baae2

Added to database: 11/20/2025, 5:36:20 PM

Last enriched: 11/20/2025, 5:38:02 PM

Last updated: 11/21/2025, 12:11:27 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats