Korean
<< Back
VID 23322
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.

* References:
http://www.debian.org/security/2017/dsa-3860
http://www.securityfocus.com/bid/98636
http://www.securitytracker.com/id/1038552
https://access.redhat.com/errata/RHSA-2017:1270
https://access.redhat.com/errata/RHSA-2017:1271
https://access.redhat.com/errata/RHSA-2017:1272
https://access.redhat.com/errata/RHSA-2017:1273
https://access.redhat.com/errata/RHSA-2017:1390
https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us
https://security.gentoo.org/glsa/201805-07
https://security.netapp.com/advisory/ntap-20170524-0001/
https://www.exploit-db.com/exploits/42060/
https://www.exploit-db.com/exploits/42084/
https://www.samba.org/samba/security/CVE-2017-7494.html

* Platforms Affected:
Samba Project, Samba versions 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba 4.6.4, 4.5.10 and 4.4.14 or later, available from the Samba Web site at https://www.samba.org/samba/download/
Related URL CVE-2017-7494 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)