Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42670: Uncontrolled Resource Consumption

0
Medium
VulnerabilityCVE-2023-42670cvecve-2023-42670
Published: Fri Nov 03 2023 (11/03/2023, 07:58:04 UTC)
Source: CVE Database V5

Description

A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:37:59 UTC

Technical Analysis

CVE-2023-42670 is a vulnerability identified in Samba versions 4.16.0, 4.18.0, and 4.19.0 that leads to uncontrolled resource consumption through the initiation of multiple incompatible Remote Procedure Call (RPC) listeners. Samba, when functioning as an Active Directory Domain Controller (AD DC), relies on RPC listeners to handle directory service queries. Under conditions of high load or unresponsiveness in the RPC server, Samba may erroneously start additional servers intended for non-AD DC purposes, such as NT4-emulation classic DCs. These servers compete for the same unix domain sockets, causing conflicts that result in partial or failed query responses from the AD DC. This manifests as errors like 'The procedure number is out of range' when administrators use tools such as Active Directory Users and Computers. The vulnerability does not expose sensitive data or allow privilege escalation but disrupts the availability of AD DC services, which are critical for authentication and authorization in enterprise environments. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting availability only. No public exploits have been reported, but the flaw could be leveraged by attackers with some level of access to degrade or deny directory services.

Potential Impact

For European organizations, the disruption of AD DC services due to this vulnerability can have significant operational impacts. Active Directory is central to identity management, authentication, and authorization in many enterprises, and interruptions can lead to widespread access issues, delayed user logins, and failure of critical business applications relying on AD. Organizations using Samba as their AD DC or in NT4-emulation roles are particularly at risk. This could affect sectors with high dependency on directory services such as finance, government, healthcare, and telecommunications. The availability impact could lead to downtime, loss of productivity, and increased support costs. While no data breach or integrity compromise is indicated, the denial-of-service aspect can be exploited for targeted disruption or as part of a larger attack chain. Given the medium severity and the requirement for some privileges, insider threats or attackers who have gained limited access could exploit this vulnerability to cause service degradation.

Mitigation Recommendations

To mitigate CVE-2023-42670, organizations should first identify if they are running affected Samba versions (4.16.0, 4.18.0, 4.19.0) especially in AD DC or NT4-emulation roles. Immediate steps include applying vendor patches or updates as they become available. In the absence of patches, administrators should monitor RPC server load and responsiveness closely to detect abnormal behavior that could trigger multiple RPC listeners. Restricting access to Samba RPC services to trusted hosts and networks can reduce exploitation risk. Implementing strict privilege management to limit who can interact with Samba RPC services is critical since the attack requires some level of privilege. Additionally, configuring Samba to disable NT4-emulation classic DC roles if not needed can prevent the conflicting server startup scenario. Regularly auditing Samba logs for unusual RPC listener activity and socket conflicts can help early detection. Network segmentation and intrusion detection systems tuned for Samba anomalies can provide further defense. Finally, ensure backup and recovery plans are in place to restore AD DC services quickly if disruption occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-09-13T04:22:28.796Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5eeb11cb603d890ffb18

Added to database: 11/20/2025, 6:33:15 PM

Last enriched: 11/20/2025, 6:37:59 PM

Last updated: 12/2/2025, 10:56:10 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats