Lucian Constantin
CSO Senior Writer

Samba security patch fixes critical remote code execution hole

news
Apr 11, 20123 mins

A Samba vulnerability can be exploited by remote unauthenticated attackers to execute arbitrary code on affected systems

The developers of Samba, the open source software that enables file and print sharing between Linux, Windows and Mac OS X computers, released security patches on Tuesday to address a critical vulnerability that can be exploited by remote attackers to execute arbitrary code on systems where the Samba service is running.

The vulnerability is identified as CVE-2012-1182 and is located in Samba’s code that handles the processing of RPC (remote procedure call) requests, particularly their translation into a NDR (Network Data Representation) format.

[ The Web browser is your portal to the world — as well as the conduit that lets in many security threats. InfoWorld’s expert contributors show you how to secure your Web browsers in this “Web Browser Security Deep Dive” PDF guide. ]

A client can send a specially crafted RPC call to a Samba server in order to exploit the vulnerability and execute unauthorized code with administrative privileges (root) on the system.

“As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately,” the Samba development team said in a security advisory.

In order to mitigate the risks associated with this vulnerability, Samba administrators can either upgrade their installations to the newly released Samba 3.6.4, Samba 3.5.14 and 3.4.16 versions, depending on which branch they use, or manually apply patches to their installations without upgrading.

The vulnerability is very serious and this is also evident from the Samba development team’s decision to release patches even for versions that are no longer officially supported, said Carsten Eiram, chief security specialist at vulnerability management firm Secunia.

Secunia rated the vulnerability as moderately critical because best use practices dictate that Samba services should only be accessible over local area networks. However, Samba can also be configured to work over the Internet and for cases like that, the vulnerability should be considered highly critical, Eiram said.

Samba comes installed by default on most Linux distributions, as well as on Apple’s Mac OS X Server. It is also available for BSD, Solaris, and other UNIX-like operating systems.

In addition to being commonly installed on many computers, Samba is also used in many UNIX-based devices like network printers or network storage devices, Eiram said.

This makes this vulnerability an attractive target for exploit writers, both for integration in commercial and free penetration testing tools like Metasploit, as well as for use in malicious attacks. “An unauthenticated code execution vulnerability in Samba is very interesting to create a working exploit for,” Eiram said.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author