I read these two threads:
- Warning! Hackers Started Using "SambaCry Flaw" to Hack Linux Systems
- 7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
And I got a little bit worried, is my Ubuntu machine safe? Or am I vulnerable to this vulnerability?
The second article mentioned that:
The flaw actually resided in the way Samba handled shared libraries.
The other thing that they say is all versions from versions 3.5.0 onwards since 2010 are vulnerable.
At that time, nearly 485,000 Samba-enabled computers were found to be exposed on the Internet, and researchers predicted that the SambaCry-based attacks also have potential to spread just like WannaCry ransomware widely. (here).
I don't have a samba server however I've got samba-libs
package installed.
What, if anything, should I do?
I'm running Ubuntu 16.04.
First of all you should have a samba server running to be vulnerable to this bug which you don't have.
This vulnerability already has been patched, its CVE-ID is: "CVE-2017-7494":
So what you should do is a system upgrade if you didn't have done it already, then you are safe to go.
Check your
apt's
"history logs" to see if your Ubuntu recently received any upgrade for samba or its libraries .to make sure you've got last updates use:
Also use:
or
aptitude changelog samba
if you are running an older version Ubuntu to get a list of last changes in this package, and if you pay attention you will see:Pay attention to the version: "2:4.3.11+dfsg-0ubuntu0.16.04.7", Then use:
to see if you have patched version installed or not.
Extra steps
If you're really paranoia, grab a copy of source code, e.g:
it will download the corresponding source code and all patches, extracts the source and apply the patches.
then go to:
You'll see the same stuff, as
apt changelog samba
. you can even look for patch itself:or even compile and install it, if you wish.
If you're carious, you can see a proof of concept for cve-2017-7494 here.
The Ubuntu Security Notice associated with the CVE has a list of affected Ubuntu releases and package versions where the patch was applied. From USN-3296-1:
In addition, USN-3296-2 states that 12.04 ESM users also have a patched version available: