Thursday, 28 April 2016

On 02:34 by admin   No comments
A software buffer overflow vulnerability in Samba open-source software could give an attacker remote access to a machine running that software, according to security company Digital Defense Inc.

The Samba Team, a group that manages the open-source software, released patches Monday and a new version of the software, Samba 2.2.8a, to address the vulnerability. Samba is a widely used software package that enables users to access and use files, printers and other shared resources on a corporate intranet or on the Internet.

Samba works with a variety of operating systems, including Linux, Unix, OpenVMS and OS/2 and allows files hosted on machines running those operating systems to share files with machines running versions of the Microsoft Corp. Windows operating system.

The buffer overflow vulnerability disclosed Monday by Digital Defense is due to an improperly written function within the Samba code.

Buffer overflows occur when a process tries to store more data in a buffer, or temporary data storage area, than it was intended to hold. Malicious hackers can use buffer overflows to place and execute code on compromised machines.

The new vulnerability has been known about within hacking circles for more than a month and was already being used to attack vulnerable systems on the Internet before the Digital Defense advisory was released, according to a security expert with knowledge of the hacking community.

In its advisory, Digital Defense, in San Antonio, Texas, said that it detected an active exploit using the Samba vulnerability on a test system it set up on the Internet.

Along with its advisory, Digital Defense Monday accidentally posted its own exploit code, a script named “trans2root.pl” on its Security Tools page.

When run against a vulnerable system, the exploit provided by Digital Defense would give an attacker total access to the remote system.

If you are storing a file on the network to share with others, only provide write access (the ability to change the file) to those few that have a real business need to change the file. Provide everyone else “read-only”access.

“It was an unfortunate incident. We had an individual who was overzealous and released a script we had developed for internal development and testing of the vulnerability,” said Rick Fleming, chief technology officer at Digital Defense.


0 comments:

Post a comment