Patches are available for Badlock vulnerability in Samba and Windows




There are patches become available for vulnerabilities in several versions of Samba, known as’ Badlock. Windows is also affected by the leak, which allows an attacker to include being able to perform a man-in-the-middle-attack.

badlock The leak was three weeks ago announced at a specially equipped site , and follows in the footsteps of other branded vulnerabilities such as Heart Bleed and Drown . There was much speculation about the severity of the leak and the expectation was that the use of distance would be through remote code execution. However, this turns out not to be the case, because an attack can not be performed from outside the network.

The vulnerability, with number CVE-2016-2118, allows man-in-the-middle attack against Samba protocols possible that different actions can be performed on the network using the intercepted traffic from a user. In the event that at this user is a manager, for example, data can be viewed and modified in the Active Directory database, such as password hashes. In a standard server can be customized among other users. Also, an attacker could execute a denial of service attack, as long as he is connected to the Samba service.

Badlock is associated with a number of other vulnerabilities and has a risk assessment been awarded in the category “high” with a cvss of 7.1. Thus it is not a critical leak. Affected versions of Samba which no patches come out, his 3.6.x, 4.0.x and 4.1.x. These are not supported anymore. For the newer versions are released patches with versions 4.4.2, 4.3.8 and 4.2.11. It is therefore recommended to carry out an update. Microsoft patches also made ​​.

Samba is an open source implementation of the SMB / CIFS – network protocol . This protocol is available on Windows and allows you to share files and printers over the network. To facilitate interoperability with other operating systems such as Linux, Unix and BSD Samba is created. Thus, for example, Linux servers participate in an Active Directory and also act as a domain controller.

The vulnerability was discovered by Stefan Metzmacher. He is part of the Samba team and works at the German sernet, which among other things deals with the development of the software. The patch is made in collaboration with Microsoft into being after Metzmacher the company had been informed.

The way Badlock announced encountered criticism from the security community. According sernet was chosen the best run to generate much attention as possible for the vulnerability. Others, however, say that thus potential attackers got the time to investigate the Samba source code itself and discovering the vulnerability. Sernet would itself benefit from all the publicity. Additionally Metzmacher itself would be responsible for a large part of the code, in which he discovered the vulnerability.

It now appears that the vulnerability is much less severe than expected, it is possible that these conjectures get more feet on the ground.


In: Technology & Gadgets Asked By: [16022 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »