Samba Hit By 'Highly Critical' Vulnerability 70
sawky puck writes "Researchers at Secunia have flagged a 'highly critical' vulnerability in Samba, the widely deployed open-source software for networked file sharing and printing. Successful exploitation allows execution of arbitrary code by tricking a user into connecting to a malicious server (e.g. by clicking an 'smb://' link) or by sending specially crafted packets to an 'nmbd' server configured as a local or domain master browser. This issue affects both Samba client and server installations."
CVE-2008-1105 (Score:5, Informative)
Already Patched (Score:5, Informative)
Re:CVE-2008-1105 (Score:1, Informative)
Re:buffer overrun .. (Score:5, Informative)
Radical virtualization might mitigate the effects so that the bugs are irrelevant (as would a capabilities based system where, even if you do smash the stack, there's nothing interesting you can do with the privileges gained), but that's not stopping the buffer overruns themselves, just making them moot.
smb/nmb filtered by default preventing this (Score:4, Informative)
Those types of filters prevent anyone following a smb:// link outside their network.
I think this is from way back in the day when remote MS Windows SMB/NMB exploits were a dime a dozen and/or network admins wanted to make sure files weren't being shared to the world.
This is why we have SELinux (Score:5, Informative)
Re:CIFS (Score:5, Informative)
The bit being deprecated is the SMB network file system, not Samba (which isn't part of the kernel in the first place). The CIFS network file system now supported in the kernel is fully compatible with Samba file servers, and Samba file servers require neither SMB NFS nor CIFS NFS to be enabled in the kernel.
Re:CIFS (Score:4, Informative)
Re:Oh jeez (Score:3, Informative)
Re:The last major Samba vulnerability... (Score:4, Informative)
Jeremy.