-
-
Samba未初始化指针释放远程代码执行漏洞
-
发表于: 2015-2-28 11:30 960
-
Samba未初始化指针释放远程代码执行漏洞
发布日期:2015-02-26
CVE ID:CVE-2015-0240
受影响的软件及系统:
====================
Samba 3.5.0 到 4.2.0rc4
未受影响的软件及系统:
======================
Samba 3.6.25
Samba 4.0.25
Samba 4.1.17
Samba 4.2.0rc5
综述:
======
Samba 3.5.0到4.2.0rc4版本的smbd文件服务程序存在一个远程代码执行漏洞,攻击者可以无需登录执行任意代码。
鉴于Samba使用较为广泛,建议正使用受影响版本的用户尽快升级。
分析:
======
Samba 3.5.0到4.2.0rc4版本的smbd文件服务程序存在一个远程代码执行漏洞。攻击者可以匿名与samba服务器建立空会话连接,然后调用ServerPasswordSet
RPC接口,导致一个未初始化的栈指针被传给TALLOC_FREE()函数,通过发送特别构造的数据,可以控制该指针的内容,当该指针被释放时,攻击者可以以root身份执行任意代码。
限制条件:
Samba 4.1以及更高版本需要在服务器配置文件中设置“server schannel = yes” 才能触发此漏洞。
解决方法:
==========
在Samba 4.0.0和更高版本中,在smb.conf配置文件中的[global]域中增加下列行:
rpc_server:netlogon=disabled
注:此方法对Samba 3.x版本无效。
厂商状态:
==========
Samba 下列版本已修复此漏洞:
Samba 3.6.25
Samba 4.0.25
Samba 4.1.17
Samba 4.2.0rc5
各大Linux发行版厂商均已修复此漏洞,请尽快进行升级:
RedHat: 39eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3u0D9L8$3N6Q4x3X3g2J5k6h3c8Z5j5i4c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5#2i4K6u0r3x3o6u0Q4x3V1j5J5x3#2)9J5c8Y4y4S2L8h3u0S2i4K6u0V1N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5g2)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3e0g2Q4x3X3b7H3x3U0b7H3i4K6u0r3
Ubuntu: a24K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2T1N6h3&6@1N6g2)9J5k6h3y4G2L8g2)9J5c8Y4g2K6L8W2)9J5c8W2g2e0e0W2)9J5k6o6t1#2x3o6S2Q4x3X3b7I4i4K6u0r3
Debian: 3adK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6s2c8J5j5h3y4C8k6i4u0Q4x3X3g2V1k6h3u0A6j5h3&6Q4x3X3g2G2M7X3N6Q4x3V1k6@1M7X3q4U0K9$3g2J5i4K6u0r3b7#2k6q4i4K6u0V1x3U0l9I4y4g2)9J5k6o6l9J5y4o6l9`.
Samba: 3c2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5h3#2T1j5g2)9J5k6h3!0J5k6#2)9J5c8Y4y4S2L8h3u0S2i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3V1k6o6g2V1g2Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6t1@1x3l9`.`.
附加信息:
==========
1. 900K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6K6k6X3!0U0N6i4y4Q4x3X3g2F1k6i4c8Q4x3V1k6A6L8X3c8W2P5q4)9J5k6i4m8Z5M7q4)9K6c8X3q4U0N6q4)9K6c8r3q4D9k6i4u0@1i4K6t1$3k6r3!0Q4x3@1c8$3K9h3g2%4i4K6t1$3j5h3W2V1i4K6y4p5x3e0f1#2
2. ed7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3u0D9L8$3N6Q4x3X3g2J5k6h3c8Z5j5i4c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5#2i4K6u0r3x3o6u0Q4x3V1j5J5x3#2)9J5c8Y4y4S2L8h3u0S2i4K6u0V1N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5g2)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3e0g2Q4x3X3b7H3x3U0b7H3i4K6u0r3
3. 1bbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2T1N6h3&6@1N6g2)9J5k6h3y4G2L8g2)9J5c8Y4g2K6L8W2)9J5c8W2g2e0e0W2)9J5k6o6t1#2x3o6S2Q4x3X3b7I4i4K6u0r3
4. b28K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6s2c8J5j5h3y4C8k6i4u0Q4x3X3g2V1k6h3u0A6j5h3&6Q4x3X3g2G2M7X3N6Q4x3V1k6@1M7X3q4U0K9$3g2J5i4K6u0r3b7#2k6q4i4K6u0V1x3U0l9I4y4g2)9J5k6o6l9J5y4o6l9`.
5. 24dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5h3#2T1j5g2)9J5k6h3!0J5k6#2)9J5c8Y4y4S2L8h3u0S2i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3V1k6o6g2V1g2Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6t1@1x3l9`.`.
发布日期:2015-02-26
CVE ID:CVE-2015-0240
受影响的软件及系统:
====================
Samba 3.5.0 到 4.2.0rc4
未受影响的软件及系统:
======================
Samba 3.6.25
Samba 4.0.25
Samba 4.1.17
Samba 4.2.0rc5
综述:
======
Samba 3.5.0到4.2.0rc4版本的smbd文件服务程序存在一个远程代码执行漏洞,攻击者可以无需登录执行任意代码。
鉴于Samba使用较为广泛,建议正使用受影响版本的用户尽快升级。
分析:
======
Samba 3.5.0到4.2.0rc4版本的smbd文件服务程序存在一个远程代码执行漏洞。攻击者可以匿名与samba服务器建立空会话连接,然后调用ServerPasswordSet
RPC接口,导致一个未初始化的栈指针被传给TALLOC_FREE()函数,通过发送特别构造的数据,可以控制该指针的内容,当该指针被释放时,攻击者可以以root身份执行任意代码。
限制条件:
Samba 4.1以及更高版本需要在服务器配置文件中设置“server schannel = yes” 才能触发此漏洞。
解决方法:
==========
在Samba 4.0.0和更高版本中,在smb.conf配置文件中的[global]域中增加下列行:
rpc_server:netlogon=disabled
注:此方法对Samba 3.x版本无效。
厂商状态:
==========
Samba 下列版本已修复此漏洞:
Samba 3.6.25
Samba 4.0.25
Samba 4.1.17
Samba 4.2.0rc5
各大Linux发行版厂商均已修复此漏洞,请尽快进行升级:
RedHat: 39eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3u0D9L8$3N6Q4x3X3g2J5k6h3c8Z5j5i4c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5#2i4K6u0r3x3o6u0Q4x3V1j5J5x3#2)9J5c8Y4y4S2L8h3u0S2i4K6u0V1N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5g2)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3e0g2Q4x3X3b7H3x3U0b7H3i4K6u0r3
Ubuntu: a24K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2T1N6h3&6@1N6g2)9J5k6h3y4G2L8g2)9J5c8Y4g2K6L8W2)9J5c8W2g2e0e0W2)9J5k6o6t1#2x3o6S2Q4x3X3b7I4i4K6u0r3
Debian: 3adK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6s2c8J5j5h3y4C8k6i4u0Q4x3X3g2V1k6h3u0A6j5h3&6Q4x3X3g2G2M7X3N6Q4x3V1k6@1M7X3q4U0K9$3g2J5i4K6u0r3b7#2k6q4i4K6u0V1x3U0l9I4y4g2)9J5k6o6l9J5y4o6l9`.
Samba: 3c2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5h3#2T1j5g2)9J5k6h3!0J5k6#2)9J5c8Y4y4S2L8h3u0S2i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3V1k6o6g2V1g2Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6t1@1x3l9`.`.
附加信息:
==========
1. 900K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6K6k6X3!0U0N6i4y4Q4x3X3g2F1k6i4c8Q4x3V1k6A6L8X3c8W2P5q4)9J5k6i4m8Z5M7q4)9K6c8X3q4U0N6q4)9K6c8r3q4D9k6i4u0@1i4K6t1$3k6r3!0Q4x3@1c8$3K9h3g2%4i4K6t1$3j5h3W2V1i4K6y4p5x3e0f1#2
2. ed7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3u0D9L8$3N6Q4x3X3g2J5k6h3c8Z5j5i4c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5#2i4K6u0r3x3o6u0Q4x3V1j5J5x3#2)9J5c8Y4y4S2L8h3u0S2i4K6u0V1N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5g2)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3e0g2Q4x3X3b7H3x3U0b7H3i4K6u0r3
3. 1bbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2T1N6h3&6@1N6g2)9J5k6h3y4G2L8g2)9J5c8Y4g2K6L8W2)9J5c8W2g2e0e0W2)9J5k6o6t1#2x3o6S2Q4x3X3b7I4i4K6u0r3
4. b28K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6s2c8J5j5h3y4C8k6i4u0Q4x3X3g2V1k6h3u0A6j5h3&6Q4x3X3g2G2M7X3N6Q4x3V1k6@1M7X3q4U0K9$3g2J5i4K6u0r3b7#2k6q4i4K6u0V1x3U0l9I4y4g2)9J5k6o6l9J5y4o6l9`.
5. 24dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5h3#2T1j5g2)9J5k6h3!0J5k6#2)9J5c8Y4y4S2L8h3u0S2i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3V1k6o6g2V1g2Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6t1@1x3l9`.`.
赞赏
赞赏
雪币:
留言: