Lucene search

K
sambaSamba SecuritySAMBA:CVE-2010-0926
HistoryFeb 02, 2010 - 12:00 a.m.

Change parameter "wide links" to default to "no";

2010-02-0200:00:00
Samba Security
www.samba.org
85

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

0.024 Low

EPSS

Percentile

89.7%

Description

The problem comes from a combination of two features in Samba, each of which on
their own are useful to Administrators, but in combination allow users to
access any file on the system that their logged in username has permissions to
read (this is not a privilege escalation problem).

By default Samba ships with the parameter “wide links = yes”, which allows
Administrators to locally (on the server) add a symbolic link inside an
exported share which SMB/CIFS clients will follow.

As an example, given a share definition:

[tmp]
path = /tmp
read only = no
guest ok = yes

The administrator could add a symlink:

$ ln -s /etc/passwd /tmp/passwd

and SMB/CIFS clients would then see a file called “passwd” within the [tmp] share that could be read and would allow clients to read /etc/passwd.

If the “wide links” parameter is set to “no”, any attempt to read this file will fail with an “access denied” error.

The problem occurs as Samba allows clients using the UNIX extensions (which are also turned on by default) to create symlinks on remotely mounted shares on which they have write access that point to any path on the file system.

This is by design, as applications running on UNIX clients may have good reasons to create symlinks anywhere on the filesystem they have write access that point to local files (such as /etc/passwd).

UNIX clients will resolve these links locally, but Windows clients will resolve them on the server. It is this combination that causes the problem.

All future versions of Samba will have the parameter “wide links” set to “no” by default, and the manual pages will be updated to explain this issue.

http://www.samba.org/samba/news/symlink_attack.html

Patch Availability

A Patch addressing this issue has been posted to:

http://www.samba.org/samba/security/

Workaround

Set:

wide links = no

in the [global] section of your smb.conf and restart smbd to eliminate this
problem.

Credits

A user named “kcopedarookie” posted what they claim to be a video of a zero-day exploit in Samba on youtube 2010-02-04.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

0.024 Low

EPSS

Percentile

89.7%