Vulnerability Alert

Samba Marshaling Code Remote Code Execution Vulnerability

 
Threat Type:CWE-94: Code Injection
IntelliShield ID:25650
Version:13
First Published:2012 April 11 16:26 GMT
Last Published:2013 February 21 19:15 GMT
Port: Not available
CVE:CVE-2012-1182
BugTraq ID:52973
Urgency:Possible use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:10.0 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:8.3
 
Version Summary:Red Hat has released additional security advisories and updated software to address the Samba Marshaling Code remote code execution vulnerability.
 
 
Description
Samba contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system.

The vulnerability is due to improper handling of remote procedure call (RPC) requests by the affected software. An unauthenticated, remote attacker could exploit the vulnerability by sending a malicious request to the targeted system. If successful, the attacker could execute arbitrary code with root-level privileges.

Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.

Samba has confirmed this vulnerability and released updated software.
 
Warning Indicators
Samba versions 3.6.3 and prior are vulnerable.
 
IntelliShield Analysis
If an exploit is successful, the attacker could execute arbitrary code on the system with elevated privileges, possibly resulting in a complete system compromise.

The vendor report indicates that authentication is not required to exploit the vulnerability. However, to be able to send the RPC requests to the system, the attacker would need access to trusted, internal networks. This requirement may limit the likelihood of a successful exploit.
 
Vendor Announcements
Samba has released a security advisory at the following link: CVE-2012-1182

Apple has released a security advisory at the following link: HT5281

FreeBSD has released a VuXML document at the following link: samba -- "root" credential remote code execution

HP has released security bulletins c03366886 and c03365218 at the following links: HPSBMU02790 SSRT100872 and HPSBUX02789 SSRT100824

MontaVista Software has released a security alert for registered users on December 13, 2012, at the following link: MontaVista Security Fixes

Oracle has released a security advisory at the following link: CVE-2012-1182

Red Hat has released an official CVE statement and security advisories for bug 804093 at the following links: CVE-2012-1182, RHSA-2012:0465, RHSA-2012:0466, RHSA-2012:0478, RHSA-2013:0506, and RHSA-2013:0515

Research In Motion has released a security advisory at the following link: KB32189
 
Impact
An unauthenticated, remote attacker could exploit the vulnerability to execute arbitrary code on the system with root-level privileges. A successful attack could cause a complete system compromise.
 
Technical Information
The vulnerability exists because the affected software improperly handles the NDR PULL DFS INFO3 user-supplied request. Similarly, the affected software also improperly handles requests such as NDR PULL LSA TrustDomainInfoControllers, NDR PULL SVCCTL StartServiceW, NDR PULL DFS EnumArray1, GetAliasMembership, SetInfoPolicy, lsa_LookupNames, ndr_ValidatePassword, or ReportEventW.

An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted requests to the vulnerable software. While processing these requests, the software uses a field for memory allocation and another field to write data to that allocation. However, the software fails to validate both fields, which could lead to a buffer overflow, corrupting memory. The attacker could take advantage of the buffer overflow to execute arbitrary code on the targeted system with root level privileges.
 
Safeguards
Administrators are advised to apply the appropriate updates.

Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.

Administrators are advised to monitor affected systems.
 
Patches/Software
Samba has released patches at the following links:

Patch for Samba 3.3.16
Patch for Samba 3.4.15
Patch for Samba 3.5.13
Patch for Samba 3.6.3
Patch for Samba 3.0

Apple has released updated software at the following links:

OS X Lion Update 10.7.4 (Client)
OS X Lion Update 10.7.4 (Server)

CentOS packages can be updated using the up2date or yum command.

FreeBSD has released ports collection updates at the following link: Ports Collection Index

HP has released updated software for registered customers at the following links:

HPSA
HP-UX CIFS-Server (Samba) A.03.01.05 or subsequent

MontaVista Software has released updated software at the following links:

Pro 5.0.24
Pro 5.0
CGE 5.1
Mobilinux 5.0.24
Mobilinux 5.0

Oracle has released patches for registered users at the following links:

SPARC
Solaris 9 with patch 114684-18 or later
Solaris 10 with patch 119757-22 or later

Intel
Solaris 9 with patch 114685-18 or later
Solaris 10 with patch 119758-22 or later
Solaris 11 11/11 SRU 7.5

Red Hat has released updated software for registered subscribers at the following link: Red Hat Network

Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.

Red Hat Enterprise Linux versions 4 and earlier can be updated using the up2date tool.


Research In Motion customers are advised to follow the resolution steps mentioned in the vendor advisory to mitigate this vulnerability.

Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
1140/0Samba Marshalling Code Remote Code Execution VulnerabilityS6422012 Apr 19 
1140/1Samba Marshalling Code Remote Code Execution VulnerabilityS6762012 Oct 24 
 
Alert History
 

Version 12, January 28, 2013, 8:22 AM: Research In Motion has released a security advisory and updated software to address the Samba Marshaling Code Remote Code Execution vulnerability.

Version 11, December 14, 2012, 7:37 AM: MontaVista Software has released a security alert and updated software to address the Samba marshaling code remote code execution vulnerability.

Version 10, October 17, 2012, 6:52 AM: Oracle has re-released a security notification and patches to address the Samba marshaling code remote code execution vulnerability.

Version 9, September 28, 2012, 10:14 AM: Functional code that demonstrates an exploit in the Samba marshaling code remote code execution vulnerability is publicly available.

Version 8, September 26, 2012, 2:59 PM: Proof-of-concept code that demonstrates an exploit in the Samba marshaling code remote code execution vulnerability is publicly available.

Version 7, June 14, 2012, 4:49 PM: HP has released an additional security bulletin and updated software to address the Samba marshaling code remote code execution vulnerability.

Version 6, June 11, 2012, 2:57 PM: HP has released a security bulletin and updated software to address the Samba marshaling code remote code execution vulnerability.

Version 5, May 11, 2012, 8:37 AM: Oracle has released a security advisory and patches to address the Samba marshaling code remote code execution vulnerability.

Version 4, May 10, 2012, 1:21 PM: Apple has released a security advisory and updated software to address the Samba marshaling code remote code execution vulnerability.

Version 3, April 19, 2012, 12:43 PM: Additional technical information to describe the Samba marshaling code remote code execution vulnerability is available.

Version 2, April 13, 2012, 1:36 PM: Red Hat has released an additional security advisory and updated packages to address the Samba marshaling code remote code execution vulnerability.

Version 1, April 11, 2012, 11:26 AM: Samba contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system.  Updates are available.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
GNU Public LicenseSamba 3.0.0 Base | 3.0.1 Base | 3.0.2 Base | 3.0.3 Base | 3.0.4 Base | 3.0.5 Base | 3.0.6 Base | 3.0.7 Base | 3.0.8 Base | 3.0.9 Base | 3.0.10 Base | 3.0.11 Base | 3.0.12 Base | 3.0.13 Base | 3.0.14 Base, a | 3.0.20 Base, a, b | 3.0.21 Base, a, b, c | 3.0.22 Base | 3.0.23 Base, a, b, c, d | 3.0.24 Base | 3.0.25 Base, a, b, c | 3.0.26 Base | 3.0.26a Base | 3.0.27 Base | 3.0.27a Base | 3.0.28 Base, a | 3.0.29 Base | 3.0.30 Base | 3.0.31 Base | 3.0.32 Base | 3.0.33 Base | 3.0.34 Base | 3.0.35 Base | 3.0.36 Base | 3.0.37 Base | 3.2.0 Base | 3.2.1 Base | 3.2.2 Base | 3.2.3 Base | 3.2.4 Base | 3.2.5 Base | 3.2.6 Base | 3.2.7 Base | 3.2.8 Base | 3.2.9 Base | 3.2.10 Base | 3.2.11 Base | 3.2.12 Base | 3.2.13 Base | 3.2.14 Base | 3.2.15 Base | 3.3 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10, .11, .12, .13, .14, .15, .16 | 3.4 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10, .11, .12, .13, .14, .15 | 3.5 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10, .11, .12, .13 | 3.6 .0, .1, .2, .3

Associated Products:
AppleMac OS X 10.6.8 Base | 10.7 Base | 10.7.1 Base | 10.7.2 Base | 10.7.3 Base
AppleMac OS X Server 10.6.8 Base | 10.7 Base | 10.7.1 Base | 10.7.2 Base | 10.7.3 Base
CentOS ProjectCentOS 5 .0 i386, .0 x86_64, .1 i386, .1 x86_64, .2 i386, .2 x86_64, .3 i386, .3 x86_64, .4 i386, .4 x86_64, .5 i386, .5 x86_64 | 6 .0 i386, .0 x86_64, .1 i386, .1 x86_64, .2 i386, .2 x86_64
FreeBSD ProjectFreeBSD 6.3 Base | 6.4 Base | 7.0 Base | 7.1 Base | 7.2 Base | 7.3 Base | 7.4 Base | 8.0 Base | 8.1 Base | 8.2 Base | 9.0 Base
HPCIFS Server Suite A.03.01.01 Base | A.03.01.02 Base | A.03.01.03 Base | A.03.01.04 Base
HPHP Server Automation 7.8 Base | 9.0 Base | 9.1 Base
HPHP-UX 11.23 Base | 11.31 Base
MontaVistaMontaVista Linux Professional 5.0, 5.0.24 | Mobilinux 5.0, 5.0.24 | CGE 5.1
Oracle CorporationSolaris Express 11 2010.11
Red Hat, Inc.Red Hat Enterprise Linux 5 IA-32, IA-64, PPC, ppc64, s390, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server AUS 6.2 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Desktop 5 IA-32, x86_64 | 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Desktop Workstation 5 IA-32, x86-64
Red Hat, Inc.Red Hat Enterprise Linux ELS (Extended Life Cycle Support) 4 IA-32, IA-64, x86_64
Red Hat, Inc.Red Hat Enterprise Linux EUS (Extended Update Support) 5.6.z IA-32, IA-64, PPC, PPC64, s390, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux HPC Node 6 x86_64
Red Hat, Inc.Red Hat Enterprise Linux Long Life 5.3 i386, ia64, x86_64 | 5.6 i386, ia64, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server 6 IA-32, PPC, PPC 64, s390, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server EUS 6.0.z IA-32, PPC, ppc64, s390, s390x, x86_64 | 6.1.z IA-32, PPC, PPC64, s390, s390x, x86_64 | 6.2.z IA-32, PPC, PPC64, s390, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Workstation 6 IA-32, x86_64
Research In MotionBlackBerry Playbook Tablet 2.0 .0, .1.358 | 2.1 .0.1032
Sun Microsystems, Inc.Solaris 9 sparc, intel | 10 sparc, x64/x86




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield