OpenSource Samba is used by IBM Netezza Host Mangement. IBM Netezza Host Management has addressed the applicable CVE.
CVEID: CVE-2017-2619**
DESCRIPTION:** Samba could allow a remote authenticated attacker to launch a symlink attack, caused by a race condition A local attacker could exploit this vulnerability using SMB1 unix extensions to create a symbolic link from a temporary file to various files on the system, which could allow the attacker to view non-exported files.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123775 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
None
Mitigation of the reported CVE applies to the following platforms only:
PureData System for Analytics N3001
PureData System for Analytics N200x
PureData System for Analytics N1001
IBM Netezza High Capacity Appliance C1000
IBM Netezza 1000
IBM Netezza 100
Execute below steps using “root” user on both ha1/ha2 hosts
Step 1. Check if Samba module is installed in the host
[host]# rpm -qa | grep samba
Step 2. Check if Samba service is running
[host]# /etc/init.d/smb status
Step 3. If Samba service is running, stop the smb service
[host]# /etc/init.d/smb stop
Step 4. Backup the /etc/samba/smb.conf file
[host]# cp /etc/samba/smb.conf /etc/samba/smb.conf_backup
Step 5. Edit the /etc/samba/smb.conf and set following parameters in global settings as below:
#============ Global Settings ==========
[global]
unix extensions = no
Step 6. Start the smb services using below command:
[host]# /etc/init.d/smb start
Note : If samba configuration file smb.conf is modified in the future, please verify if above settings are changed. If changed, please make sure to mitigate this issue by following steps 2 to 6.