brandon Posted February 23, 2015 Share Posted February 23, 2015 All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution vulnerability in the smbd file server daemon. A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges. https://access.redhat.com/security/cve/CVE-2015-0240 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0240 Quote Link to comment
gundamguy Posted February 24, 2015 Share Posted February 24, 2015 Question does this issue require an attacker to be on your LAN? Quote Link to comment
WeeboTech Posted February 24, 2015 Share Posted February 24, 2015 Question does this issue require an attacker to be on your LAN? Yes, If you happen to have a comprised desktop, this could then somehow infect a samba server. Another potential issue would be if samba were exposed to the internet inadequately or by accident. Quote Link to comment
gundamguy Posted February 25, 2015 Share Posted February 25, 2015 Question does this issue require an attacker to be on your LAN? Yes, If you happen to have a comprised desktop, this could then somehow infect a samba server. Another potential issue would be if samba were exposed to the internet inadequately or by accident. Good to know! Quote Link to comment
limetech Posted June 16, 2015 Share Posted June 16, 2015 FYI, unRaid-6.0.0 uses Samba 4.1.17 which includes fix for this vulnerability. In a future unRaid release we'll be updating to Samba 4.2.x. Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.