Samba is a popular standard for providing Windows-based file and print services. It allows for interoperability between Linux and UNIX systems and Microsoft Windows. Samba allows Linux, Mac and FreeBSD users to set up & share folders on Windows computers using the server message block (SMB) protocol. The vulnerability (CVE-2017-7494) affects all versions of Samba from 3.5.0 onwards and in some instances can be exploited by just one line of code, say if port 445 is open.
“All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.”
The security community is concerned because like WannaCry, which targeted an SMB bug, this critical vulnerability could be a conduit for a “wormable” exploit that spreads quickly, putting home NAS devices and corporate implementations at risk. While Rapid7 claims there’s no sign of the vulnerability being exploited in the wild, this vulnerability poses a severe threat to thousands of users globally, with over 104,000 Samba installations said to be vulnerable to remote takeover right now.
Given the recent WannaCry Ransomware epidemic where more than 230,000 users in over 150 became infected, it’s extremely important that organizations using out-of-date systems and software understand the risks they’re facing and what can be done to migrate away from them.
Organizations need to be reviewing their configuration management systems to spot vulnerable systems within their IT environment and perform comprehensive vulnerability scans to identify misconfigured or rogue systems.
Read this article on Threat Post