Scovata una vulnerabilità critica in Samba presente da ben 7 anni

by Marco Giannini on

Correte ad aggiornare Samba sul vostro PC!

I developer di Samba hanno scovato una vulnerabilità critica (CVE-2017-7494) presente in Samba da ben 7 anni (interessa tutte le versioni più recenti, da Samba 3.5.0 in poi) che consente l'esecuzione di codice in modalità remota e che potrebbe consentire ad un aggressore remoto di prendere il controllo di una macchina Linux o Unix.

CVE-2017-7494.html:

====================================================================
== Subject: Remote code execution from a writable share.
==
== CVE ID#: CVE-2017-7494
==
== Versions: All versions of Samba from 3.5.0 onwards.
==
== Summary: Malicious clients can upload and cause the smbd server
== to execute a shared library from a writable share.
==
====================================================================

===========
Description
===========

All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.

==================
Patch Availability
==================

A patch addressing this defect has been posted to

http://www.samba.org/samba/security/

Additionally, Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as
security releases to correct the defect. Patches against older Samba
versions are available at http://samba.org/samba/patches/. Samba
vendors and administrators running affected versions are advised to
upgrade or apply the patch as soon as possible.

==========
Workaround
==========

Add the parameter:

nt pipe support = no

to the [global] section of your smb.conf and restart smbd. This
prevents clients from accessing any named pipe endpoints. Note this
can disable some expected functionality for Windows clients.

=======
Credits
=======

This problem was found by steelo . Volker
Lendecke of SerNet and the Samba Team provided the fix.

Se siete su Ubuntu e derivate la vulnerabilità è stata già corretta con i recenti aggiornamenti e dunque vi basterà soltanto aggiornare il sistema.

Leggi il contenuto originale su Marco's Box

Written by: Marco Giannini