access.redhat.com
Open in
urlscan Pro
2a02:26f0:480:d::210:f149
Public Scan
URL:
https://access.redhat.com/security/cve/CVE-2017-7494
Submission: On November 30 via api from BY — Scanned from DE
Submission: On November 30 via api from BY — Scanned from DE
Form analysis
1 forms found in the DOMName: topSearchForm — GET /search/browse/search/
<form class="ng-pristine ng-valid topSearchForm" id="topSearchForm" name="topSearchForm" action="/search/browse/search/" method="get" enctype="application/x-www-form-urlencoded">
<cp-search-autocomplete class="push-bottom PFElement" path="/webassets/avalon/j/data.json" num-items="5" placeholder="Enter your search term" pfelement="" type="container"></cp-search-autocomplete>
<div> Or <a href="/support/cases/#/troubleshoot">troubleshoot an issue</a>. </div>
</form>
Text Content
Skip to navigation Skip to main content UTILITIES * Subscriptions * Downloads * Red Hat Console * Get Support * Subscriptions * Downloads * Red Hat Console * Get Support * Products TOP PRODUCTS * Red Hat Enterprise Linux * Red Hat OpenShift * Red Hat Ansible Automation Platform All Products DOWNLOADS AND CONTAINERS * Downloads * Packages * Containers TOP RESOURCES * Documentation * Product Life Cycles * Product Compliance * Errata * Knowledge RED HAT KNOWLEDGE CENTER * Knowledgebase Solutions * Knowledgebase Articles * Customer Portal Labs * Errata TOP PRODUCT DOCS * Red Hat Enterprise Linux * Red Hat OpenShift * Red Hat Ansible Automation Platform All Product Docs TRAINING AND CERTIFICATION * About * Course Index * Certification Index * Skill Assessment * Security RED HAT PRODUCT SECURITY CENTER * Security Updates * Security Advisories * Red Hat CVE Database * Errata REFERENCES * Security Bulletins * Security Measurement * Severity Ratings * Security Data TOP RESOURCES * Security Labs * Backporting Policies * Security Blog * Support RED HAT SUPPORT * Support Cases * Troubleshoot * Get Support * Contact Red Hat Support RED HAT COMMUNITY SUPPORT * Customer Portal Community * Community Discussions * Red Hat Accelerator Program TOP RESOURCES * Product Life Cycles * Customer Portal Labs * Red Hat JBoss Supported Configurations * Red Hat Insights Or troubleshoot an issue. English SELECT YOUR LANGUAGE * English * Français * 한국어 * 日本語 * 中文 (中国) Infrastructure and Management * Red Hat Enterprise Linux * Red Hat Satellite * Red Hat Subscription Management * Red Hat Insights * Red Hat Ansible Automation Platform Cloud Computing * Red Hat OpenShift * Red Hat OpenStack Platform * Red Hat OpenShift * Red Hat OpenShift AI * Red Hat OpenShift Dedicated * Red Hat Advanced Cluster Security for Kubernetes * Red Hat Advanced Cluster Management for Kubernetes * Red Hat Quay * Red Hat OpenShift Dev Spaces * Red Hat OpenShift Service on AWS Storage * Red Hat Gluster Storage * Red Hat Hyperconverged Infrastructure * Red Hat Ceph Storage * Red Hat OpenShift Data Foundation Runtimes * Red Hat Runtimes * Red Hat JBoss Enterprise Application Platform * Red Hat Data Grid * Red Hat JBoss Web Server * Red Hat build of Keycloak * Red Hat support for Spring Boot * Red Hat build of Node.js * Red Hat build of Quarkus Integration and Automation * Red Hat Application Foundations * Red Hat Fuse * Red Hat AMQ * Red Hat 3scale API Management All Products All Red Hat Back to menu QUICK LINKS: REDHAT.COM, CUSTOMER PORTAL, RED HAT'S DEVELOPER SITE, RED HAT'S PARTNER SITE. * You are here RED HAT Learn about our open source products, services, and company. * You are here RED HAT CUSTOMER PORTAL Get product support and knowledge from the open source experts. * You are here RED HAT DEVELOPER Read developer tutorials and download Red Hat software for cloud application development. * You are here RED HAT PARTNER CONNECT Get training, subscriptions, certifications, and more for partners to build, sell, and support customer solutions. PRODUCTS & TOOLS * ANSIBLE.COM Learn about and try our IT automation product. * RED HAT ECOSYSTEM CATALOG Find hardware, software, and cloud providers―and download container images―certified to perform with Red Hat technologies. TRY, BUY, & SELL * RED HAT HYBRID CLOUD CONSOLE Access technical how-tos, tutorials, and learning paths focused on Red Hat’s hybrid cloud managed services. * RED HAT STORE Buy select Red Hat products and services online. * RED HAT MARKETPLACE Try, buy, sell, and manage certified enterprise software for container-based environments. EVENTS * RED HAT SUMMIT AND ANSIBLEFEST Register for and learn about our annual open source IT industry event. We're sorry but cve-details doesn't work properly without JavaScript enabled. Please enable it to continue. CVE-2017-7494 Known exploitThis CVE is high risk and there are known public exploits leveraging this vulnerability. Address this vulnerability with high priority. Public on Last Modified: UTC ImportantImportant ImpactWhat does this mean? 7.5CVSS v3 Score Breakdown INSIGHTS VULNERABILITY ANALYSIS View exposed systems DESCRIPTION A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. STATEMENT This vulnerability exists in the samba server, client side packages are not affected. This vulnerability exists in the samba server, client side packages are not affected. MITIGATION Any of the following: 1. SELinux is enabled by default and our default policy prevents loading of modules from outside of samba's module directories and therefore blocks the exploit 2. Mount the filesystem which is used by samba for its writable share using "noexec" option. 3. Add the parameter: nt pipe support = no to the [global] section of your smb.conf and restart smbd. This prevents clients from accessing any named pipe endpoints. Note this can disable some expected functionality for Windows clients. ADDITIONAL INFORMATION * Bugzilla 1450347: samba: Loading shared modules from any path in the system leading to RCE (SambaCry) * FAQ: Frequently asked questions about CVE-2017-7494 EXTERNAL REFERENCES * https://www.cve.org/CVERecord?id=CVE-2017-7494 * https://nvd.nist.gov/vuln/detail/CVE-2017-7494 * https://www.samba.org/samba/security/CVE-2017-7494.html * https://www.cisa.gov/known-exploited-vulnerabilities-catalog COMMON VULNERABILITY SCORING SYSTEM (CVSS) SCORE DETAILS IMPORTANT NOTE CVSS scores for open source components depend on vendor-specific factors (e.g. version or build chain). Therefore, Red Hat's score and impact rating can be different from NVD and other vendors. Red Hat remains the authoritative CVE Naming Authority (CNA) source for its products and services (see Red Hat classifications). CVSS v3 Score BreakdownRed HatNVD CVSS v3 Base Score 7.5 9.8 Attack Vector Network Network Attack Complexity High Low Privileges Required Low None User Interaction None None Scope Unchanged Unchanged Confidentiality Impact High High Integrity Impact High High Availability Impact High High CVSS V3 VECTOR Red Hat: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H NVD: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ACKNOWLEDGEMENTS Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges steelo as the original reporter. FREQUENTLY ASKED QUESTIONS WHY IS RED HAT'S CVSS V3 SCORE OR IMPACT DIFFERENT FROM OTHER VENDORS? For open source software shipped by multiple vendors, the CVSS base scores may vary for each vendor's version depending on the version they ship, how they ship it, the platform, and even how the software is compiled. This makes scoring of vulnerabilities difficult for third-party vulnerability databases such as NVD that only provide a single CVSS base score for each vulnerability. Red Hat scores reflect how a vulnerability affects our products specifically. For more information, see https://access.redhat.com/solutions/762393. MY PRODUCT IS LISTED AS "UNDER INVESTIGATION" OR "AFFECTED", WHEN WILL RED HAT RELEASE A FIX FOR THIS VULNERABILITY? * "Under investigation" doesn't necessarily mean that the product is affected by this vulnerability. It only means that our Analysis Team is still working on determining whether the product is affected and how it is affected. * "Affected" means that our Analysis Team has determined that this product is affected by this vulnerability and might release a fix to address this in the near future. WHAT CAN I DO IF MY PRODUCT IS LISTED AS "WILL NOT FIX"? A "will not fix" status means that a fix for an affected product version is not planned or not possible due to complexity, which may create additional risk. Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options: * Upgrade to a supported product version that includes a fix for this vulnerability (recommended). * Apply a mitigation (if one exists). * Open a support case to request a prioritization of releasing a fix for this vulnerability. WHAT CAN I DO IF MY PRODUCT IS LISTED AS "FIX DEFERRED"? A deferred status means that a fix for an affected product version is not guaranteed due to higher-priority development work. Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options: * Apply a mitigation (if one exists). * Open a support case to request a prioritization of releasing a fix for this vulnerability. * Red Hat Engineering focuses on addressing high-priority issues based on their complexity or limited lifecycle support. Therefore, lower-priority issues will not receive immediate fixes. WHAT IS A MITIGATION? A mitigation is an action that can be taken to reduce the impact of a security vulnerability, without deploying any fixes. I HAVE A RED HAT PRODUCT BUT IT IS NOT IN THE ABOVE LIST, IS IT AFFECTED? The listed products were found to include one or more of the components that this vulnerability affects. These products underwent a thorough evaluation to determine their affectedness by this vulnerability. Note that layered products (such as container-based offerings) that consume affected components from any of the products listed in this table may be affected and are not represented. WHY IS MY SECURITY SCANNER REPORTING MY PRODUCT AS VULNERABLE TO THIS VULNERABILITY EVEN THOUGH MY PRODUCT VERSION IS FIXED OR NOT AFFECTED? In order to maintain code stability and compatibility, Red Hat usually does not rebase packages to entirely new versions. Instead, we backport fixes and new features to an older version of the package we distribute. This can result in some security scanners that only consider the package version to report the package as vulnerable. To avoid this, we suggest that you use an approved vulnerability scanner from our Red Hat Vulnerability Scanner Certification program. Not sure what something means? Check out our Security Glossary. Want to get errata notifications? Sign up here. This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact Red Hat Product Security. Last Modified: UTC CVE description copyright © 2021 X (formerly Twitter) QUICK LINKS * Downloads * Subscriptions * Support Cases * Customer Service * Product Documentation HELP * Contact Us * Customer Portal FAQ * Log-in Assistance SITE INFO * Trust Red Hat * Browser Support Policy * Accessibility * Awards and Recognition * Colophon RELATED SITES * redhat.com * developers.redhat.com * connect.redhat.com * cloud.redhat.com RED HAT LEGAL AND PRIVACY LINKS * About Red Hat * Jobs * Events * Locations * Contact Red Hat * Red Hat Blog * Diversity, equity, and inclusion * Cool Stuff Store * Red Hat Summit © 2024 Red Hat, Inc. RED HAT LEGAL AND PRIVACY LINKS * Privacy statement * Terms of use * All policies and guidelines * Digital accessibility * Cookie-präferenzen