[v2.2] samba<3.5.15: Incorrect permission checks (CVE-2012-2111)
Samba versions 3.4.x to 3.6.4 inclusive are affected by a
vulnerability that allows arbitrary users to modify privileges on a
Security checks were incorrectly applied to the Local Security
Authority (LSA) remote proceedure calls (RPC) CreateAccount,
OpenAccount, AddAccountRights and RemoveAccountRights allowing any
authenticated user to modify the privileges database.
This is a serious error, as it means that authenticated users can
connect to the LSA and grant themselves the “take ownership”
privilege. This privilege is used by the smbd file server to grant the
ability to change ownership of a file or directory which means users
could take ownership of files or directories they do not own.
Patches addressing this issue have been posted to:
Additionally, Samba 3.6.5, Samba 3.5.15 and 3.4.17 have been issued as
security releases to correct the defect. Patches against older Samba
versions are available at:
Samba administrators running affected versions are advised to upgrade
to 3.6.5, 3.5.15, or 3.4.17 or apply these patches as soon as
Immediately set the “enable privileges = no” parameter in the
section of the smb.conf. This will prevent any further use of granted
privileges on the file server and protect from compromise.
To remove any incorrectly granted privileges, remove the file:
from your system, and once the patch is applied re-grant specified
user privileges using the “net rpc rights” command.
This vulnerability was reported by Ivano Cristofolini. Many thanks to
him for reporting this promptly.
Patches were created by Jeremy Allison of the Samba Team, and reviewed
by Guenther Deschner of the Samba Team, the SUSE Security Team, and
Tyler Hicks of Canonical.
(from redmine: issue id 1125, created on 2012-05-07, closed on 2012-05-09)
- Revision c63fe772 by Natanael Copa on 2012-05-07T08:26:26Z:
main/samba: security upgrade to 3.5.15 (CVE-2012-2111) fixes #1125