{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-44142","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-04-23T19:02:19.767Z","dateReserved":"2021-11-22T00:00:00.000Z","datePublished":"2022-02-21T14:30:12.659Z"},"containers":{"cna":{"datePublic":"2022-01-31T00:00:00.000Z","providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-09-17T08:06:35.393Z"},"descriptions":[{"lang":"en","value":"The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root."}],"affected":[{"vendor":"Samba","product":"Samba","versions":[{"version":"unspecified","lessThan":"4.13.17","status":"affected","versionType":"custom"},{"version":"unspecified","lessThan":"4.14.12","status":"affected","versionType":"custom"},{"version":"unspecified","lessThan":"4.15.5","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.samba.org/samba/security/CVE-2021-44142.html"},{"url":"https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"},{"tags":["third-party-advisory"],"url":"https://kb.cert.org/vuls/id/119678"},{"url":"https://bugzilla.samba.org/show_bug.cgi?id=14914"},{"name":"GLSA-202309-06","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-06"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-125 Out-of-bounds Read","cweId":"CWE-125"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-787 Out-of-bounds Write","cweId":"CWE-787"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://www.kb.cert.org/vuls/id/119678"},{"url":"https://www.samba.org/samba/security/CVE-2021-44142.html","tags":["x_transferred"]},{"url":"https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin","tags":["x_transferred"]},{"tags":["third-party-advisory","x_transferred"],"url":"https://kb.cert.org/vuls/id/119678"},{"url":"https://bugzilla.samba.org/show_bug.cgi?id=14914","tags":["x_transferred"]},{"name":"GLSA-202309-06","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-06"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T04:17:24.423Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:30:59.386639Z","id":"CVE-2021-44142","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T19:02:19.767Z"}}]}}