Hacker News new | past | comments | ask | show | jobs | submit login
Remote root hole in Samba (lwn.net)
98 points by wglb on April 10, 2012 | hide | past | favorite | 15 comments



Has this remote root really been around for ten years?

http://lwn.net/Articles/491523/

edit:

Samba 3.0.x - 3.6.3

http://www.samba.org/samba/history/samba-3.0.0.html

So... yeah... 9 years. Wow.


Yeah, this is indeed exceptional. How can that really happen?


Maybe the proverbial "eyes" are on other projects or something?


Well, this bug was in auto-generated RPC code.


<trolling>Having such vulnerabilities, it seems Samba was more Windows compatible than it was used to be known </trolling>


Don't have SMB exposed on any public network anywhere ever.


In the work I've been doing on Mifi hotspots of late I can tell you every SMB-supporting router and network file sharing device from your home ASUS kit to enterprise NASes is exposed, not to mention OSX. This thing is huge.

Some abuse cases:

* On a wireless network if you have SMB file sharing enabled on your Mac and no firewall, this could be easily abused once working code comes out.

* Got a QNAP NAS or other sharing device and thinking of taking it to your local LAN party? Hope you know everyone well enough.

* Using a MiFi hotspot to get access to the Internet when travelling? Hope you changed the default password, and that it's not listening on it's external interface.

* Corporate network using an appliance-based SAN/NAS? What a fantastic place to hide, right where all the files are.

This is an awesome bug, I wish I had the time to look into it properly but am busy until next weekend.


Running Samba exposed to a public network isn't the only issue here. Even on an internal network, this would allow file/directory permissions to be bypassed.


So you want every client on your private network to have root access to your SMB server? Remote root is a problem if you have any networked clients.


He means that SMB is not a secure protocol and can't be run securely over an untrusted network at all. Vulnerabilities within a private network are a different class of problem. Obviously you should upgrade/patch and pull the fix. But if (say) the operation of your 20-person company depends on a live Samba instance, you might logically make the decision to leave it unpatched on your internal network for a day or so until you have time to test the upgrade.


Yes, that's why they fixed the bug.


Fun idea. Unfortunately some of us have bosses who tell us what to do.


The bugzilla entry (https://bugzilla.samba.org/show_bug.cgi?id=8815) contains reproducers for the issue.



How nice, now there's a public POC for a remote root exploit in a very widely used file-sharing service.

https://bugzilla.samba.org/attachment.cgi?id=7433




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: