Announcement

Collapse
No announcement yet.

A Samba vulnerability was announced

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    A Samba vulnerability was announced

    https://it.slashdot.org/story/17/05/...other-wannacry

    Of course, the vendors selling software AV products pounced. Here is the Ubuntu CVS notice:
    https://www.ubuntu.com/usn/usn-3296-1/

    The problem can be corrected by updating your system to the following package version:
    Ubuntu 17.04:samba 2:4.5.8+dfsg-0ubuntu0.17.04.2
    Ubuntu 16.10:samba 2:4.4.5+dfsg-2ubuntu5.6
    Ubuntu 16.04 LTS:samba 2:4.3.11+dfsg-0ubuntu0.16.04.7
    Ubuntu 14.04 LTS:samba 2:4.3.11+dfsg-0ubuntu0.14.04.8
    For the 16.04 fLTS release the patch is
    https://launchpad.net/ubuntu/+source...buntu0.16.04.7

    Guess what automatically came down the update pipe yesterday (the 24th)?
    You guessed it!
    The 12.04 LTS has another CVS, 3296-2, but their patch probably came down yesterday too.

    Nice not having to worry about such things. BTW, no known exploit of this "WannaCry" behave-a-like has been seen in the wild.

    You can check your system with
    Code:
    $[B] systemctl status smb[/B]● smb.service
       Loaded: not-found (Reason: No such file or directory)
       Active: inactive (dead)
    You can check to see if you have port 445 open (smbd) with
    lsof -i
    Last edited by GreyGeek; May 25, 2017, 04:49 PM.
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    #2
    Also to note on that from what I read it works only if the user has ROOT access. So I take that to mean that either a user would have to alter their account to always be ROOT or they actually approved the program to run by typing in that ROOT pw.

    I think that is how I read that so correct me if I'm wrong.

    Comment

    Working...
    X