A new vulnerability has been announced that affects Samba, a network protocol that is primarily used for Windows file and print sharing. The vulnerability affects all versions of Samba from 3.5.0 onwards.
The vulnerability allows remote code execution by allowing a malicious client to upload a shared library to a writable share, and then cause the Samba software to load and execute the uploaded library.
While no exploits are yet known, we strongly recommend you patch any systems running Samba as soon as possible. Patches are available for versions 4.4 onwards, and a work-around exists for unsupported and vulnerable older versions.
Please note that Samba might be included in embeded devices, appliances, or printers; and in some cases, it may be hard to patch or implement the work-around. In such cases, you may need to consider other ways to mitigate the issue by use of firewalls or other access restrictions.
For more information, or to see the work-around, see the advisory at https://www.samba.org/samba/security/CVE-2017-7494.html
If you need help or have questions, please contact the CNS Help Desk at firstname.lastname@example.org or https://www.cns.utexas.edu/help/
Written by Eric Rostetter, Senior System Administrator
Questions or comments? The best and easiest way to contact us is via the CNS Help Desk form.