Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-10 Thread David Jacoby
Hi FD, This is not a zero-day vulnerability in the concept of a programmatic Flaw. But if no one, or the majority of all Samba users never knew that This option was available, or knew that this functionality was enabled by default I think this problem should still be highlighted in the way that

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-09 Thread Michael Wojcik
From: Stefan Kanthak [mailto:stefan.kant...@nexgo.de] Sent: Saturday, 06 February, 2010 08:21 Dan Kaminsky wrote: [...] (On a side note, you're not going to see this sort of symlink stuff on Windows, What exactly do you mean? Traversing symlinks on the server/share, or creation

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-09 Thread Krzysztof Halasa
Thierry Zoller thie...@zoller.lu writes: Facts : - Several distributions run with vulnerable settings per default if there is a misconfiguration it is part of the vendor. - Your not supposed to be able to traverse dirs. What's wrong with creating $HOME/tmp - /tmp/$USER (not necessarily

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-09 Thread Stefan Kanthak
Michael Wojcik wrote: From: Stefan Kanthak [mailto:stefan.kant...@nexgo.de] Sent: Saturday, 06 February, 2010 08:21 Dan Kaminsky wrote: [...] (On a side note, you're not going to see this sort of symlink stuff on Windows, What exactly do you mean? Traversing symlinks on the

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-09 Thread Michael Wojcik
From: Stefan Kanthak [mailto:stefan.kant...@nexgo.de] Sent: Monday, 08 February, 2010 16:33 Michael Wojcik wrote: From: Stefan Kanthak [mailto:stefan.kant...@nexgo.de] Sent: Saturday, 06 February, 2010 08:21 Since Windows 2000 NTFS supports junctions, which pretty much resemble

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-08 Thread Stefan Kanthak
Dan Kaminsky wrote on February 06, 2010 6:43 PM: You need admin rights to create junctions. OUCH! No, creating junctions (as well as the Vista introduced symlinks) DOESN'T need admin rights! [snip] Stefan ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Thierry Zoller
http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html -- http://blog.zoller.lu Thierry Zoller ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Thierry Zoller
Hi Paul, Facts : - Several distributions run with vulnerable settings per default if there is a misconfiguration it is part of the vendor. - Your not supposed to be able to traverse dirs. Consequence it is a vulnerability, whether you can mitigate it is a different piece of cake. Next time

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread paul . szabo
Dear Thierry, Of course you could disable ... but is it by enabled default? Hmm... looking at http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#WRITEABLE http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#READONLY it seems that writeable is off by default: a Samba

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Stefan Kanthak
Dan Kaminsky wrote: [...] (On a side note, you're not going to see this sort of symlink stuff on Windows, What exactly do you mean? Traversing symlinks on the server/share, or creation of wide symlinks by the client on the server/share? Since Windows 2000 NTFS supports junctions, which

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Dan Kaminsky
You need admin rights to create junctions. At that point, path constraints aren't relevant, just psexec and get not only arbitrary path but arbitrary code. The fix is to do what everybody with a directory traversal bug has to do, block out of path relative directories. In this specific

[Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread marxclou
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear Paul, seems like u get personal pissed about the situation or you are not able to see that this is obviously a problem. But maybe you can enlighten everybody how it is possible per default not to traversal a directory by cd but doing this via

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread marxclou
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The default setting is writeable = no. If you change that, then you are responsible for reading the docs and setting secure options. This is an interesting point of view. However u haven't answered my question. Is there an option to enable a

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread paul . szabo
Dear Marx, This is an interesting point of view. I had replied to you personally only, you should not have posted my reply to any mailing lists. But since you posted... yes my views are interesting, should be studied and followed, for enlightenment :-) However u haven't answered my question.

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread paul . szabo
I find it puzzling how this discussion, including the official Samba response http://www.samba.org/samba/news/symlink_attack.html fails to consider whether the mentioned configuration (when admin sets non-default writeable = yes but leaving default wide links = yes) allows write access to the

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread marxclou
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I had replied to you personally only, you should not have posted my reply to any mailing lists. But since you posted... I'm very sorry about this. This may sound odd, but it wasn't my idea of putting a private mail public. This was not an act of

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Dan Kaminsky
On Feb 6, 2010, at 5:26 PM, Stefan Kanthak stefan.kant...@nexgo.de wrote: Dan Kaminsky wrote on February 06, 2010 6:43 PM: You need admin rights to create junctions. OUCH! No, creating junctions (as well as the Vista introduced symlinks) DOESN'T need admin rights! [snip] Really?

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-05 Thread paul . szabo
Dear Kingcope, The samba server follows symlinks by default. There are options (follow symlinks, wide links) for turning it off: http://www.samba.org/samba/docs/using_samba/ch08.html#samba2-CHP-8-SECT-1.2 http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#FOLLOWSYMLINKS

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-05 Thread paul . szabo
Dear Dan, The bug here is that out-of-path symlinks are remotely writable. ... You mean creatable. ... the fact that he can *generate* the symlink breaks ... Nothing breaks if the admin sets wide links = no for that share: the link is not followed. But Samba supports dropping a user into a

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-05 Thread Dan Kaminsky
The bug here is that out-of-path symlinks are remotely writable. If a pre-existing symlink is there, it's not a problem. But Kingcope's bug is legit, the fact that he can *generate* the symlink breaks the entire path concept of SMB shares. As long as cd .. wasn't working, symlink .. mustn't

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-05 Thread Kingcope
Hello Paul, First and foremost I did not know about the configuration setting which closes the bug when i posted the advisory. So this was my mistake. But for the most servers which are not entirely hardened (and my assumption is that this applies to many servers in internal networks) the

Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-05 Thread paul . szabo
Dear Kingcope, Turning off symlink support in samba closes the hole but then no access to symlinks created by the administrator is possible ... Correct. Maybe what you want is for Samba to add and support an option like allow create symlink (with default no). I myself do not think it would be

[Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-04 Thread Kingcope
Hello list, this is Kingcope. You can view a demonstration of the zeroday entitled 'Samba Remote Zero-Day Exploit' with full details on youtube. The bug is a logic fuckup. http://www.youtube.com/watch?v=NN50RtZ2N74 I added some nice greek tune so turn your speakers on (or off). Greetings to