Badlock Security flaw in Samba - CVE-2016-2118
Updated
Was this information helpful?
Background Information
Acknowledgments
Impacted Products
This issue has been rated as having Important security impact by Red Hat Product Security. Other related vulnerabilities, ranging from Moderate to Critical and described in Critical Security Flaws in Samba Released on April 12 2016 , have also been made public. Additional information on Badlock can be found in Badlock: SAMR and LSA protocol man-in-the-middle attack against Samba (CVE-2016-2118) .
The following Red Hat Product versions are impacted:
- Red Hat Enterprise Linux 4*
- Red Hat Enterprise Linux 5
- Red Hat Enterprise Linux 6
- Red Hat Enterprise Linux 7
- Red Hat Gluster Storage 3
*An active ELS subscription is required for access to this patch in RHEL 4. Please contact Red Hat sales or your specific sales representative for more information if your account does not have an active ELS subscription.
What is the Red Hat Enterprise Linux Extended Life Cycle Support Add-On (ELS)?
Attack Description and Impact
- Critical Security flaws in Samba released on 12-April-2016 (CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118).
Understanding Exposure
For customers using Samba as a domain member in AD environment:
- How to detect: 'security = ads' in the smb.conf file
- We recommend migrating to samba3x (3.6) on RHEL5 or migrating to RHEL6/samba (3.6), or migrating to RHEL7/samba (4.2)
- Migration is not automatic, it needs to be planned, particularly around IDMAP as there were changes in 3.0 -> 3.6 and 3.6 -> 4.x
For customers using Samba as a domain member in NT environment:
- How to detect: 'security = domain' in the smb.conf file
- We recommend migrating to samba3x (3.6) on RHEL5 or migrating to RHEL6/samba (3.6), or migrating to RHEL7/samba (4.2)
- Migration is not automatic, it needs to be planned, particularly around IDMAP as there were changes in 3.0 -> 3.6 and 3.6 -> 4.x
For customers using Samba as a file server:
- How to detect: 'security = user' or 'security = ads' or 'security = domain', or 'security = standalone' and shares defined in the smb.conf file
- We recommend migrating to samba3x (3.6) on RHEL5 or migrating to RHEL6/samba (3.6), or migrating to RHEL7/samba (4.2)
- Migration is not automatic, it needs to be planned, particularly around IDMAP as there were changes in 3.0 -> 3.6 and 3.6 -> 4.x
-
- At the very least, Samba servers should be updated. Because Badlock is a protocol flaw, both the servers and clients may be affected, depending on the configuration of the Samba infrastructure. Red Hat Product Security advises customers to update both servers and clients.
- This security advisory tightens some of the security options used to configure Samba. This may break configurations when a Samba server is updated but the client is not. It is possible to roll back to older insecure options to continue interoperatibilty, (for example by setting
allow dcerpc auth level connect = yes
in thesmb.conf
file), but Red Hat Product Security highly recommends not to do so, since it re-introduces some of the attack vectors.
- This security advisory tightens some of the security options used to configure Samba. This may break configurations when a Samba server is updated but the client is not. It is possible to roll back to older insecure options to continue interoperatibilty, (for example by setting
- Yes, if an admin user communicates with a Samba server using a non-secure client, or uses a secure client to communicate to an insecure Samba server, a man-in-the-middle attacker could potentially use this to exploit this flaw.
- Will encryption protect me against this MITM attack?
- The SMB protocol, by default, only encrypts credentials and commands while files are transferred in plain text. It is recommended that in security and privacy sensitive scenarios encryption is used to protect all communications. Encryption was added to Samba in version 3.2, but only for Samba clients. Microsoft added SMB encryption support to SMB 3.0 in Windows 8 and Windows Server 2012. However, both of these types of encryption only protect communications, such a file transfers, after SMB negotiation and commands have been completed. It is this phase that contains the vulnerability highlighted above. Samba/SMB encryption is a good practice but is not sufficient for protection against this vulnerability.
- The SMB protocol, by default, only encrypts credentials and commands while files are transferred in plain text. It is recommended that in security and privacy sensitive scenarios encryption is used to protect all communications. Encryption was added to Samba in version 3.2, but only for Samba clients. Microsoft added SMB encryption support to SMB 3.0 in Windows 8 and Windows Server 2012. However, both of these types of encryption only protect communications, such a file transfers, after SMB negotiation and commands have been completed. It is this phase that contains the vulnerability highlighted above. Samba/SMB encryption is a good practice but is not sufficient for protection against this vulnerability.
- Red Hat is updating packages (samba, samba3x, samba4) for Samba versions 4.2, 4.1, 4.0, 3.6, & 3.0 across all currently supported products, including dependencies where required such as IPA, OpenChange, and libraries libtalloc, libtdb and libevent.
- Red Hat is updating packages (samba, samba3x, samba4) for Samba versions 4.2, 4.1, 4.0, 3.6, & 3.0 across all currently supported products, including dependencies where required such as IPA, OpenChange, and libraries libtalloc, libtdb and libevent.
How can I mount a share on a Samba server that has the updated packages installed?
Using the default "ntlm" authentication method fails when connecting to a Samba server that has the updated packages installed. To mount such a share, instead enable the NT LAN Manager Security Support Provider (NTLMSSP) protocol. For example:
# mount //server/share cifs -o sec=ntlmssp,user=user_name,password=password
For security reasons, do not re-enable the "raw NTLMv2 auth" parameter in the /etc/samba/smb.conf file on the Samba server.
Updates for Affected Products
Red Hat Enterprise Linux 4 - Extended Lifecycle Support* | samba (v3.0) | RHSA-2016:0625 | |
Red Hat Enterprise Linux 5 | samba (v3.0) | RHSA-2016:0621 | |
Red Hat Enterprise Linux 5 | samba3x (v3.6) | RHSA-2016:0613 | |
Red Hat Enterprise Linux 5.6 Long Life | samba (v3.0) | RHSA-2016:0623 | |
Red Hat Enterprise Linux 5.6 Long Life | samba3x (v3.6) | RHSA-2016:0624 | |
Red Hat Enterprise Linux 5.9 Long Life | samba (v3.0) | RHSA-2016:0623 | |
Red Hat Enterprise Linux 5.9 Long Life | samba3x (v3.6) | RHSA-2016:0624 | |
Red Hat Enterprise Linux 6 | samba (v3.6) | RHSA-2016:0611 | |
Red Hat Enterprise Linux 6 | samba4 (v4.0) | RHSA-2016:0612 | |
Red Hat Enterprise Linux 6.2 Advanced Update Support** | samba (v3.6) | RHSA-2016:0619 | |
Red Hat Enterprise Linux 6.2 Advanced Update Support** | samba4 (v4.0) | RHSA-2016:0620 | |
Red Hat Enterprise Linux 6.4 Advanced Update Support** | samba (v3.6) | RHSA-2016:0619 | |
Red Hat Enterprise Linux 6.4 Advanced Update Support** | samba4 (v4.0) | RHSA-2016:0620 | |
Red Hat Enterprise Linux 6.5 Advanced Update Support** | samba (v3.6) | RHSA-2016:0619 | |
Red Hat Enterprise Linux 6.5 Advanced Update Support** | samba4 (v4.0) | RHSA-2016:0620 | |
Red Hat Enterprise Linux 6.6 Extended Update Support | samba (v3.6) | RHSA-2016:0619 | |
Red Hat Enterprise Linux 6.6 Extended Update Support | samba4 (v4.0) | RHSA-2016:0620 | |
Red Hat Enterprise Linux 7 | samba (v4.2) | RHSA-2016:0612 | |
Red Hat Enterprise Linux 7.1 Extended Update Support | samba (v4.1) | RHSA-2016:0618 | |
Red Hat Gluster Storage 3 (EL6) | samba (v4.2) | RHSA-2016:0614 | |
Red Hat Gluster Storage 3 (EL7) | samba (v4.2) | RHSA-2016:0614 |
*An active ELS subscription is required for access to this patch in RHEL 4. Please contact Red Hat sales or your specific sales representative for more information if your account does not have an active ELS subscription.
What is the Red Hat Enterprise Linux Extended Life Cycle Support Add-On (ELS)?
**An active AUS subscription is required for access to this patch in RHEL 6.X AUS.
Comments