Samba LSA RPC `take ownership´ Privilege Security Bypass Vulnerability
RISK: Medium Risk
TYPE: Servers - Other Servers
A vulnerability has been identified in Samba, which can be exploited by malicious users to bypass certain security restrictions.
The security issue is caused due to improper application of security checks in the CreateAccount, OpenAccount, AddAccountRights, and RemoveAccountRights remote procedure calls (RPC) within the Local Security Authoriy (LSA). This can be exploited to gain "take ownership" privileges and e.g. change the ownership of arbitrary files and directories on the smdb file server.
Impact
- Security Restriction Bypass
System / Technologies affected
- Samba versions 3.4.x through 3.6.4
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Apply patch or update to version 3.4.17, 3.5.15, and 3.6.5.
http://www.samba.org/samba/security/CVE-2012-2111
Vulnerability Identifier
Source
Related Link
Share with