It was also independently discovered by Orange Tsai of DEVCORE and reported to the Samba team. If both options are set to different settings than the default values, the system is not affected by the security issue,” they noted.ĬVE-2021-44142 was discovered and its exploitation demonstrated at the Pwn2Own Austin 2021 in November 2021 by Nguyễn Hoàng Thạch and Billy Jheng Bing-Jhong of STAR Labs. “The problem in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file. ![]() The specific flaw exists within the parsing of EA metadata in the Samba server daemon (smbd) when opening a file,” the ZDI Research Team noted, and shared technical details about the flaw and a variant – all of which have been patched in the latest Samba security updates.Īccording to the Samba Team, the vulnerability can be exploited by any user that has write access to a file’s extended attributes – even a guest or unauthenticated user if they have those permissions.īut not all systems may be affected. It allows Unix-like systems to serve as file servers for Apple devices. Netatalk is an open-source implementation of the Apple Filing Protocol (AFP). “The fruit module that ships with Samba is designed to provide interoperability between Samba and Netatalk. Samba allows file and print sharing between computers running Windows and those running Unix or Linux.ĬVE-2021-44142 is an out-of-bounds heap read/write vulnerability in Samba’s vfs_fruit virtual file system (VFS) module. Several updated versions of Samba have been released on Monday, fixing CVE-2021-44142 and two other flaws ( 1, 2), but since the software is included in most Linux and Unix-like operating systems (including Apple’s macOS and macOS Server), users of those are advised to keep an eye out for specific updates by those developer teams. ![]() ![]() A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to execute arbitrary code as root on affected Samba installations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |