Samba Hit By 'Highly Critical' Vulnerability 70
sawky puck writes "Researchers at Secunia have flagged a 'highly critical' vulnerability in Samba, the widely deployed open-source software for networked file sharing and printing. Successful exploitation allows execution of arbitrary code by tricking a user into connecting to a malicious server (e.g. by clicking an 'smb://' link) or by sending specially crafted packets to an 'nmbd' server configured as a local or domain master browser. This issue affects both Samba client and server installations."
CVE-2008-1105 (Score:5, Informative)
Re: (Score:1, Informative)
Oh jeez (Score:5, Funny)
<snark/>
Re: (Score:2)
Re: (Score:2)
This affects clients too. It says so right there in the summary even.
Re: (Score:2)
Re:Oh jeez (Score:5, Funny)
My guess is that most of his servers are in the 10/8 or 192.168/16 ranges. Run an nmap scan on those netblocks and I'll bet you'll find something. While you're at it, be sure to check out 127.0.0.1 for any "hidden" servers.
Re: (Score:1, Funny)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Informative)
Guess we'll see Apple release 2008-004 soon (Score:2)
Already Patched (Score:5, Informative)
Re: (Score:3, Funny)
Re: (Score:1)
net-fs/samba-3.0.28a-r1
Vulnerability? And how! (Score:1, Funny)
Re: (Score:1, Offtopic)
Re: (Score:1)
I sure know I have a highly critical vulnerability to a pretty Brazillian lady doing the Samba, eh gents?
I know you can mod something funny, but is there any way to mod something !Funny?
Offtopic seems to be the mod of choice in this case. I always thought nerds like me loved puns. Maybe only good puns, though.
Other unused one-liners:
"When I do the Samba I'm pretty vulnerable to kicks to the knees"
"Samba has always been vulnerable... to arthritis"
"This vulnerability is easily fixed by switching the audio back to a simple 2/4 beat."
Re: (Score:1)
It's my most favorite-est mod ever.
Samba isn't Windows (Score:2, Flamebait)
Re: (Score:2)
Re: (Score:2)
Is it a x86 architecture only vulnerability?
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Whew, for a minute there I thought Windows MIGHT have a vulnerability for once.
"Thanks for playing. Try again."
You won't make friends by belittling people.Re: (Score:2)
FAIL
Re: (Score:2)
In my neck of the woods, it is. The linux desktops are configured NOT to have any publicly-shared directories. Want to transfer a file over the lan? Use ftp like __DIETY__ intended!
Re: (Score:3, Funny)
buffer overrun .. (Score:3, Interesting)
Does this apply to a particular CPU/MMU compiler combination or is it generic across all systems? Is it technically possible to design a system that is immune to buffer overruns or, by default, fails safe, as in not allowing any old code to walk all over the address space.
Re:buffer overrun .. (Score:5, Informative)
Radical virtualization might mitigate the effects so that the bugs are irrelevant (as would a capabilities based system where, even if you do smash the stack, there's nothing interesting you can do with the privileges gained), but that's not stopping the buffer overruns themselves, just making them moot.
how about this .. (Score:4, Interesting)
"we adapted the memory safety techniques from the SAFECode project
Re: (Score:2, Interesting)
For example, you could use your 64-bit address space and put
Re:buffer overrun .. (Score:5, Funny)
Re: (Score:1, Funny)
Re: (Score:3, Interesting)
Yes, it's called managed code (Java/.NET) and yes, you can even design hardware that runs byte code. It will slightly hamper performance, but it has its advantages. Of course, the way it is currently done is to implement the JVM in softw
what manages the managed code ? .. (Score:2)
Another software solution, which also begs the question, what protects the 'managed code' bits from getting buffer overruns and wouldn't it be simpler to do it in the hardware? Of course the 'managed code' bits are only good in so far as they manage to detect malware all the time. Wouldn't it be simpler to make the kernel immune to these type of bugs as in the SAFECode project. That way when a process fails on garbage collection hooks, exception handling, type s [msdn.com]
Re: (Score:2)
Yes: Java, for example, assuming that the JVM itself doesn't have any bugs. Let the flamefest begin.
Please note, however, that any sufficiently complex protocol can be considered a programming language in itself, and the program using it a virtual machine; and it is impossible to guarantee that the interpreter can't be put into a
Re: (Score:1)
> default, fails safe, as in not allowing any old code to walk all over the address space.
I don't know about "immune" in the absolute sense, but there are certainly things you can do. Writing everything (_everything_, including low-level system libraries) in a very-high-level language that dynamically resizes/reallocates buffers as necessary (e.g., integers automatically promote to bigints if they overflow, writin
smb/nmb filtered by default preventing this (Score:4, Informative)
Those types of filters prevent anyone following a smb:// link outside their network.
I think this is from way back in the day when remote MS Windows SMB/NMB exploits were a dime a dozen and/or network admins wanted to make sure files weren't being shared to the world.
Re: (Score:1)
I am frankly more paranoid on my personal network that any network I've been on professionally.
CIFS (Score:1, Offtopic)
Re:CIFS (Score:5, Informative)
The bit being deprecated is the SMB network file system, not Samba (which isn't part of the kernel in the first place). The CIFS network file system now supported in the kernel is fully compatible with Samba file servers, and Samba file servers require neither SMB NFS nor CIFS NFS to be enabled in the kernel.
Re:CIFS (Score:4, Informative)
This is why we have SELinux (Score:5, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Should read "except for anyone who's deliberately hacked their samba configuration to run as root". Considering there's no need to do this, and all distros package samba to create and run as it's own unprivileged uid, this will be pretty much nobody. And anyone who has done that has only themselves to blame.
Re: (Score:2)
Re: (Score:2)
Samba will spawn a process that runs as a configured (by default: nobody) user when the connecting user isn't a local (or NIS, ldap, etc) account. Again, it needs to start off as root in order to do this.
Re: (Score:2)
Unless, of course, someone was so careless as to let a server who's purpose is to grant remote access to the filesystem actually access the filesystem it is supposed to grant access to :).
There is no way to detect the difference between an evil program overwriting an important file with random garbage and a saintly user editing that same file to contain extremely relevant data. Consequently, SELinux doesn't help at all
The last major Samba vulnerability... (Score:2)
Anyway, hoping I won't be driven from Debian to, uh, Gentoo or something.
Re:The last major Samba vulnerability... (Score:4, Informative)
Jeremy.
Samba's travails (Score:1)