Lucene search

K
myhack58佚名MYHACK58:62201789434
HistorySep 22, 2017 - 12:00 a.m.

Samba information leak flaws vulnerability is a bug vulnerability number CVE–2017–12163 in advance prevention publicity-vulnerability warning-the black bar safety net

2017-09-2200:00:00
佚名
www.myhack58.com
49

0.629 Medium

EPSS

Percentile

97.9%

Samba as a Linux and UNIX system implemented on the SMB Protocol is a freeware software in the*nix category have a very wide range of application scenarios.
Recently, the 360 Gear Team the security researcher(even a Han,Hu JI-bin)found that Samba SMB1 Protocol there is a security flaw, the attacker has a Samba account write permissions to the case, the remote drains away the target Samba server in the memory information, the impact of the Samba full version, the slot number is CVE-2017-12163。 After the Samba and Google team to provide a correction plan.
It is reported, this gap is referred to as SambaBleed gap.
360CERT advocated the use of the Samba software users get security updates.
0x01 event affect
Impact level
Gap risk level is high, affect the size of a wide
Impact version
Samba full version
Corrected version
Samba 4.6.8, 4.5.14 and 4.4.16
0x02 slit details
In the SMB1 Protocol, the user write request size is not strict inspection, beyond that the user has sent the data size, causing the server’s memory information is written to the file, but is not able to control which memory information is written. The official patch before writing plus the requested write data giant of the discrimination, to the defense of the gap.
Leakage is the memory information:
! [](/Article/UploadPic/2017-9/2017922223354518. jpg? www. myhack58. com)
0x03 amended plan
1, Samba 4.6.7, 4.5. 13 and 4. 4. 15 version don’t have to provide an official patch, we strongly advocate that all affected users, to update the official patch, or update to the corrected version.
Patch address: https://www.samba.org/samba/history/security.html
2, the mandatory use of the SMB2 Protocol in smb. conf[global]set the"server min protocol = SMB2_02", and restart the smbd the.