Number: IRCNE2015022434
Date: 2015/02/24
According to “computerworld”, security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.
Samba is an implementation of the SMB/CIFS networking protocol that enables Unix-like systems, including Linux, BSD, Solaris and Mac OS X to share files and printers with Windows computers. It also allows such systems to be integrated into Microsoft Active Directory environments and even act as domain controllers.
The new vulnerability is located in the smbd file server and was discovered by Richard van Eeden of Microsoft Vulnerability Research.
"It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server," the Red Hat security team said in a blog post. "No authentication is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root."
All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable. The Samba project released versions 4.2.0rc5, 4.1.17, 4.0.25 and 3.6.25 to address the issue and also made code patches available.
For Samba 4.0.0 and above there is a manual workaround that involves adding the line rpc_server:netlogon=disabled to the [global] section in the smb.conf file.
- 2