Menu
Critical remote code execution flaw patched in Samba

Critical remote code execution flaw patched in Samba

Users should install the Samba updates available for their systems as soon as possible

Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.

Samba is an implementation of the SMB/CIFS networking protocol that enables Unix-like systems, including Linux, BSD, Solaris and Mac OS X to share files and printers with Windows computers. It also allows such systems to be integrated into Microsoft Active Directory environments and even act as domain controllers.

The new vulnerability is located in the smbd file server and was discovered by Richard van Eeden of Microsoft Vulnerability Research.

"It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server," the Red Hat security team said in a blog post. "No authentication is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root."

All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable. The Samba project released versions 4.2.0rc5, 4.1.17, 4.0.25 and 3.6.25 to address the issue and also made code patches available.

Updated Samba packages were released by multiple Linux distributions including Red Hat Enterprise Linux, Ubuntu, Debian, Fedora and Suse. Users are advised to install the updates as soon as possible.

For Samba 4.0.0 and above there is a manual workaround that involves adding the line rpc_server:netlogon=disabled to the [global] section in the smb.conf file.

The Samba service is not normally configured to be accessible from the Internet, so any potential attackers looking to exploit this flaw would generally need to be inside the same network as an affected server, said Carsten Eiram, the chief research officer of vulnerability intelligence firm Risk Based Security, via email.

"It's certainly not every day we see such vulnerabilities in high profile and widely used products like Samba," Eraim said, adding that the flaw is quite severe. "Samba has released updated versions for 4 different branches as well as patches. I highly recommend anyone using Samba to apply those immediately."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags patch managementubuntuRed HatintrusionsambapatchesExploits / vulnerabilities

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments