Vulnerabilities

Remote Code Execution Flaw Patched in Samba 4

All versions of Samba 4.x.x are affected by a vulnerability that could be exploited for remote code execution. Patches for this security hole were released on Friday.

<p class="MsoNormal"><span><span><strong>All versions of Samba 4.x.x are affected by a vulnerability that could be exploited for remote code execution. Patches for this security hole were released on Friday.</strong></span></span></p>

All versions of Samba 4.x.x are affected by a vulnerability that could be exploited for remote code execution. Patches for this security hole were released on Friday.

Samba is an open source software suite that provides file and print services to Server Message Block (SMB) and Common Internet File System (CIFS) clients. The solution is designed for interoperability between Linux/Unix servers and Windows-based clients.

According to the advisory published by Samba developers, the vulnerability affects the nmbd NetBIOS name services daemon. nmbd is a NetBIOS name server that provides NetBIOS over IP naming services to clients.

“A malicious browser can send packets that may overwrite the heap of the target nmbd NetBIOS name services daemon. It may be possible to use this to generate a remote code execution vulnerability as the superuser (root),” reads the advisory from Samba.

All versions of Samba 4.x.x are affected by the flaw. Samba 4.1.11 and 4.0.21 have been released to address the issue, but patches for older versions have also been made available. Vendors and administrators are advised to update their installations or apply the patches to mitigate potential attacks.

As a workaround for users that can’t apply the patches immediately, Samba recommends not running nmbd.

The vulnerability was reported by Volker Lendecke, a Samba Team member at SerNet. Lendecke has also provided a fix for the flaw, which has been assigned the CVE identifier CVE-2014-3560.

Last month, Samba published a series of updates and patches to address a couple of denial-of-service (DoS) issues, one of which, CVE-2014-0244, enabled attacks on unauthenticated nmbd NetBIOS name services. The other security bug fixed in June, CVE-2014-3493, was described as a “denial of service crash involving overwriting memory on an authenticated connection to the smbd file server.”

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version