Описание
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code.
Меры по смягчению последствий
Prevent SMB1 access to the server by setting the parameter: "server min protocol = SMB2" to the [global] section of your smb.conf and restart smbd. This prevents and SMB1 access to the server. Note this could cause older clients to be unable to connect to the server.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | samba | Not affected | ||
Red Hat Enterprise Linux 6 | samba | Not affected | ||
Red Hat Enterprise Linux 6 | samba4 | Fixed | RHSA-2017:3278 | 29.11.2017 |
Red Hat Enterprise Linux 7 | samba | Fixed | RHSA-2017:3260 | 27.11.2017 |
Red Hat Gluster Storage 3.3 for RHEL 6 | samba | Fixed | RHSA-2017:3261 | 27.11.2017 |
Red Hat Gluster Storage 3.3 for RHEL 7 | samba | Fixed | RHSA-2017:3261 | 27.11.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.3 Medium
CVSS3
Связанные уязвимости
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote a ...
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
EPSS
6.3 Medium
CVSS3