Skip to main content

Samba LSA RPC `take ownership´ Privilege Security Bypass Vulnerability

Last Update Date: 22 May 2012 Release Date: 2 May 2012 4539 Views

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

A vulnerability has been identified in Samba, which can be exploited by malicious users to bypass certain security restrictions.

The security issue is caused due to improper application of security checks in the CreateAccount, OpenAccount, AddAccountRights, and RemoveAccountRights remote procedure calls (RPC) within the Local Security Authoriy (LSA). This can be exploited to gain "take ownership" privileges and e.g. change the ownership of arbitrary files and directories on the smdb file server.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • Samba versions 3.4.x through 3.6.4

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

 


Vulnerability Identifier


Source


Related Link