Samba vulnerabilities allow hackers to invade thousands of remote Linux computers
Samba is an open source software that runs on popular platforms, including Windows, Linux, Unix, IBM System 390 and OpenVMS. It allows users of non-Windows operating systems like GNU / Linux or macOS to share folders, files, and computers with Windows via SMB protocol.
The newly discovered remote code execution vulnerability (CVE-2017-7497) affects all new versions since Samba 3.5.0 released on March 1, 2010. Samba wrote on his page on Wednesday:
All Samba versions from 3.5.0 and later have a remote code execution vulnerability, allowing infected clients to upload content to shared folders and cause the server to download and execute the file " .
Is this the Linux version of the EternalBlue vulnerability?
According to the Shodan search engine, more than 485,000 Samba installation computers use port 445 to access the Internet. According to researchers at Rapid 7, more than 104,000 endpoints on the Internet run Samba versions with vulnerabilities, of which 92,000 endpoints run unsupported Samba versions .
Since Samba is the SMB protocol used on Linux and Unix systems, some experts think it is the EternalBlue Linux version, the vulnerability is exploited by WannaCry. Should we call this SambaCry?
Keep in mind that the number of systems with vulnerabilities is numerous and the exploitation of vulnerabilities is also very easy, Samba can completely create a large-scale attack . Even Home Network private networks can be exploited if used with devices with network attached storage (NAS).
Exploiting code (using Metasploit tool)
This vulnerability is exploited through the way Samba shares files. The attacker uses the random Samba module to upload to the public folder and when the user server downloads it, it will execute the malicious code. Exploiting the vulnerability is very simple, just a piece of code to execute the malicious code on the infected machine.
simple.create_pipe ("/ path / to / target.so")
The Samba vulnerability has been put on Metasploit (a framework used to test, using code that exploits vulnerabilities), allowing researchers and hackers to easily exploit the vulnerability.
Patch
Samba patched for new versions 4.6.4, 4.5.10 and 4.4.14. Users of the Samba version of the vulnerability are still encouraged to quickly install the patch. If you can't update the latest versions of Samba immediately, you can avoid this vulnerability by adding the following line to Samba's smb.conf file.
nt pipe support = no
After adding, you only need to restart the SMB daemon (smbd). This will prevent the client from accessing the network and disable some functions to connect to Windows.
Although publishers of Linux distributions, including Red Hat and Ubuntu, have released patches for users, the threat still comes from NAS devices when they cannot be updated quickly. Craig Williams of Cisco said that because most NAS devices run Samba and contain important data, this vulnerability has "the risk of becoming the first large-scale ransomware worm on Linux ".
Meanwhile, NETGEAR also offers security advice regarding CVE-2017-7494, that many routers and NAS products have been affected by using Samba version 3.5.0 or higher. However, the company has just released an update guide for ReadyNAS products running OS 6.x.
You should read it
- EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
- Hackers start using SambaCry to attack Linux computers
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux
- Download the free WannaCry malware checker now
- The Internet is experiencing a huge problem with C / C ++, causing developers to 'sweat'
- Safeguard against Shellshock security vulnerabilities
- WannaCry remains one of the most dangerous global security threats
- IBM developed a new technology to patch security holes
May be interested
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computerthe research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
- A programmer discovers a security hole that could bring down the global systemat the end of march, andres freund discovered a backdoor hidden in a software part of the linux operating system that could lead hackers to access hundreds of millions of computers worldwide.
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement casesa code execution vulnerability in winrar has been exploited more than 100 times separately by hackers in the first week since it was revealed, and it is expected that this number will continue to increase in the future.
- Four Windows vulnerabilities can be exploited in the perfect attack chainthe vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
- How to install and use TeamViewer on Linuxteamviewer is a powerful tool that allows teams to collaborate and share their screens in real time. it is also extremely useful in remote technology support.
- A serious security error appeared on Android that allowed hackers to control smartphones through a photoa serious security hole on the android operating system has just been discovered, which can help hackers run malicious code and control smartphones remotely by displaying a png image file (portable network graphic).
- 4 reasons why white hat hackers love to use Kali Linuxthis operating system has many different features and tools, but there is always controversy as to why hackers use kali linux for work related to network security.
- There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computersthe fingerprint manager pro program of microsoft windows 7, 8 and 8.1 allows users to store data, log in personal accounts on websites, log in to a lenovo computer via fingerprint there are many vulnerabilities that may allow hackers to access user sensitive data.
- How to use AnyDesk Remote to control remote computersanydesk remote is an application to control computers remotely on android and ios phones.
- Create NAS network storage with Raspberry Pi and Sambaone of the most frequent uses of the raspberry pi is to create a local media storage system, commonly referred to as a nas. today, tipsmake.com will explain how to create a nas on a raspberry pi using samba software.