Menu
Microsoft, Samba Badlock flaw not critical, but serious enough

Microsoft, Samba Badlock flaw not critical, but serious enough

Badlock's details do not impress the security community, but users should still deploy the patches in a timely manner

Microsoft and the Samba project fixed a vulnerability in their implementation of the SMB/CIFS protocol after the flaw was initially announced three weeks ago under the name Badlock.

The vulnerability, covered by Microsoft in its MS16-047 security bulletin published Tuesday, was also fixed in Samba 4.4.2, 4.3.8 and 4.2.11. It could allow a man-in-the-middle attacker to impersonate an authenticated user and execute arbitrary network calls to the server, possibly with administrative privileges.

Badlock's existence was announced on March 22 by a company called SerNet, which  offers Samba consulting, support and development services. It employs the person who found the flaw: a Samba development team member named Stefan Metzmacher.

SerNet was criticized by some members of the security community at the time because it created a special name, logo and website for the vulnerability and revealed its existence three weeks before the patch, giving hackers ample time to find it on their own, even in the absence of technical details.

The company argued that the vulnerability was severe enough to warrant this approach, which is debatable now that the flaw's details are out and it appears to be less serious than most people expected.

Microsoft rates the impact of CVE-2016-0128 -- Badlock's tracking ID in the Common Vulnerabilities and Exposures database -- as important, not critical. The company noted in its assessment that exploitation is unlikely.

Based on the Common Vulnerability Scoring System (CVSS), the flaw has a severity score of 7.1, out of a maximum of 10.

Badlock's potential impact is "certainly a concern and admins should patch their systems as early as possible," said Karl Sigler, threat intelligence manager at Trustwave in a blog post. "However I can't say that this vulnerability rises to any level that deserves the focus that a dedicated website and three weeks of buildup have given Badlock."

The fact that exploiting the flaw requires an attacker to be in a position to intercept RPC traffic, specifically sessions that use SMB to authenticate a system or to manage users or policies on a remote system using the SAMR or LSAD protocols, limits its severity, Sigler said. "Any effective attack requires the attacker to be in the right place at the right time."

There have been more serious and more direct remote code execution flaws using RPC and SMB/CIFS over the years. Potential attacks against Badlock will likely happen inside local networks, because running SMB/CIFS severs directly on the Internet is generally considered bad security practice.

"While we do recommend you roll out the patches as soon as possible -- as we generally do for everything -- we don't think Badlock is the Bug To End All Bugs," said Tod Beardsley, security research manager at Rapid7, in a blog post. "In reality, an attacker has to already be in a position to do harm in order to use this, and if they are, there are probably other, worse (or better depending on your point of view) attacks they may leverage."

If you're using Samba, the most popular implementation of SMB/CIFS for Linux systems, it's worth knowing that all versions between 3.6.x and 4.4.0 are affected by this flaw, but patches are only available for the 4.2.x and higher branches. That's because versions older than 4.2 are no longer supported, so if you're running any of them, you should consider upgrading to a newer release.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments