{"vuid":"VU#268336","idnumber":"268336","name":"Samba command injection vulnerability","keywords":["Samba","arbitrary command execution","user input","/bin/sh","samba","samba-3.0.25","STR02-C","cert-seccode:STR02-C","apple_2007-007"],"overview":"Samba fails to properly filter input to /bin/sh. This vulnerability may allow a remote, authenticated attacker to execute arbitrary code on a Samba server.","clean_desc":"Samba provides file and print services for Microsoft Windows, Unix, Linux, and OS X clients. Samba can also act as a Primary Domain Controller (PDC) or as a Domain Member. Samba runs on most Unix-like systems. Samba versions prior to 3.0.24 pass unchecked user input from RPC messages to /bin/sh when calling externals scripts that are listed in the Samba configuration file. An attacker may be able to exploit this vulnerability by sending specially crafted RPC messages to a vulnerable server. This vulnerability occurred as a result of failing to comply with recommndation STR02-C of the CERT C Programming Language Secure Coding Standard.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary commands.","resolution":"Apply a patch or upgrade\nThese vulnerabilities are addressed in Samba version 3.0.25. In addition, patches are available to address this vulnerability in Samba version 3.0.24. Refer to the Samba Security Releases website for more information.","workarounds":"Do not load external shell scripts From the CVE-2007-2447 entry on the Samba security page: This defect may be alleviated by removing all defined external script invocations (username map script, add printer command, etc...) from smb.conf. Restrict access Limiting access to the Samba server to trusted hosts may mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to Joshua J. Drake, iDefense Labs, and the Samba team for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://samba.org/samba/history/security.html","http://us4.samba.org/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447.patch","http://www.samba.org","http://secunia.com/advisories/25232/","http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1","http://docs.info.apple.com/article.html?artnum=306172"],"cveids":["CVE-2007-2447"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-14T17:24:09Z","publicdate":"2007-05-14T00:00:00Z","datefirstpublished":"2007-05-14T19:35:05Z","dateupdated":"2008-07-21T17:51:18Z","revision":42,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"9","cam_exploitation":"0","cam_internetinfrastructure":"9","cam_population":"4","cam_impact":"17","cam_easeofexploitation":"18","cam_attackeraccessrequired":"18","cam_scorecurrent":"7.4358","cam_scorecurrentwidelyknown":"11.9799","cam_scorecurrentwidelyknownexploited":"20.2419","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.4358,"vulnote":null}