A seven-year-old remote code execution vulnerability, tracked as CVE-2017-7494, affects all versions of the Samba software since 3.5.0.
Re: Samba bug, the metasploit one-liner to trigger is just: simple.create_pipe("/path/to/target.so")
— HD Moore (@hdmoore) May 24, 2017
nt pipe support = no
to their Samba configuration file and restarting the network’s SMB daemon.
The change will limit clients from accessing some network computers.
The Samba bug appears to be a network wormable issue that could be exploited by a malicious code to self-replicate from vulnerable machine to vulnerable machine without requiring user interaction.
Hurry up, the exploit for the Samba bug is expected to be available in the days for the Metasploit framework.
HD Moore, who is vice president of research and development at Atredis Partners, posted the following images showing successful exploits against Samba on a computer running Ubuntu and NAS device made by Synology.
Examples of exploiting Samba CVE-2017-7494 on Ubuntu 16.04 and a Synology NAS. Metasploit module should be PRd sometime in the next 24 hours pic.twitter.com/rQSKnt2CIk
— HD Moore (@hdmoore) May 24, 2017
The first crack at a Metasploit PR for Samba CVE-2017-7494 already appeared on GitHub.
First crack at a Metasploit PR for Samba CVE-2017-7494: https://t.co/kyns4aFLr9
— HD Moore (@hdmoore) May 25, 2017
[adrotate banner=”9″]
(Security Affairs – CVE-2017-7494, Samba bug)
[adrotate banner=”13″]