Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 19 Mar 2003 10:08:28 +0100
From:      Marton Kenyeres <mkenyeres@konvergencia.hu>
To:        security@freebsd.org
Subject:   Re: Samba vulnerability
Message-ID:  <200303191008.28706.mkenyeres@konvergencia.hu>
In-Reply-To: <3E774C85.902@drweb.ru>
References:  <20030318143759.GA77729@nevermind.kiev.ua> <3E774C85.902@drweb.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

On Tuesday 18 March 2003 17.42, Nikolaj I. Potanin wrote:
> > A flaw has been detected in the Samba main smbd code which could allow
> > an external attacker to remotely and anonymously gain Super User (root)
>
>       ^^^^^^^^^^^^^^^^^
>
> Does anyone here have smbd bound to an external interface? ;-)
>

Although the advisory mentions external attackers, I bet this vulnerability 
allows malicious internal users to gain root privileges on an intranet file 
server. As far as I know a vast majority of attacks are attempted by 
insiders, so I don't find this funny at all. 

Also, form smb.conf(5):

By default Samba will query the kernel for the list of all active interfaces 
and use any interfaces except 127.0.0.1 that are broadcast capable.

So it is very well possible that in fact, someone here have smbd bound to an 
external interface. Anyway, I don't think that this kind of 'lamaz deserve to 
be r00ted' attitude is appropriate for this list. Pardon me, if I 
misunderstood your intentions.

Cheers,

-- 
Kenyeres Márton
mkenyeres@konvergencia.hu
KVG:) Konvergencia Kft.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200303191008.28706.mkenyeres>