- Joined
- Mar 6, 2014
- Messages
- 9,553
CVE-2017-7494: All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load and execute it.
The best solution is (of course) to update to the latest version of FreeNAS when it is released.
If for some reason, you are stuck on an old version of FreeNAS, setting the auxiliary parameter
nt pipe support = no
as an auxiliary parameter under Services->SMB mitigates the risk of this vulnerability. It may adversely affect windows clients that expect this functionality. I briefly tested on a Windows 10 client with standalone samba server (FreeNAS 11 VM). Setting this prevents clients from being able to connect to "\\server", but they are still able to connect to "\\server\share". Test before pushing it out on production machines. Note that code exploiting this vulnerability will be executed as root.Source: https://bugzilla.redhat.com/show_bug.cgi?id=1450347#c3
P.S. setting all samba shares as "read only" also mitigates the problem.
Last edited: