Vulnerability Details : CVE-2017-7494
Public exploit exists!
Used for ransomware!
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
Vulnerability category: Execute code
Products affected by CVE-2017-7494
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-7494
Top countries where our scanners detected CVE-2017-7494
Top open port discovered on systems with this issue
445
IPs affected by CVE-2017-7494 215,482
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-7494!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
CVE-2017-7494 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Samba Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Samba contains a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share and then cause the server to load and execute it.
Notes:
https://www.samba.org/samba/security/CVE-2017-7494.html; https://nvd.nist.gov/vuln/detail/CVE-2017-7494
Added on
2023-03-30
Action due date
2023-04-20
Exploit prediction scoring system (EPSS) score for CVE-2017-7494
97.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-7494
-
Samba is_known_pipename() Arbitrary Module Load
Disclosure Date: 2017-03-24First seen: 2020-04-26exploit/linux/samba/is_known_pipenameThis module triggers an arbitrary shared library load vulnerability in Samba versions 3.5.0 to 4.4.14, 4.5.10, and 4.6.4. This module requires valid credentials, a writeable folder in an accessible share, and knowledge of the server-side path of the writeable folde
CVSS scores for CVE-2017-7494
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-7494
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7494
-
https://access.redhat.com/errata/RHSA-2017:1271
RHSA-2017:1271 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us
HPESBUX03759 rev.2 - HP-UX CIFS Sever using Samba, Multiple Remote VulnerabilitiesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1273
RHSA-2017:1273 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1272
RHSA-2017:1272 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.exploit-db.com/exploits/42084/
Samba 3.5.0 < 4.4.14/4.5.10/4.6.4 - 'is_known_pipename()' Arbitrary Module Load (Metasploit)Third Party Advisory;VDB Entry
-
https://security.netapp.com/advisory/ntap-20170524-0001/
CVE-2017-7494 Samba Remote Code Execution Vulnerability in StorageGRID Products | NetApp Product SecurityThird Party Advisory
-
https://security.gentoo.org/glsa/201805-07
Samba: Multiple vulnerabilities (GLSA 201805-07) — Gentoo securityThird Party Advisory
-
https://www.exploit-db.com/exploits/42060/
Samba 3.5.0 - Remote Code ExecutionThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:1390
RHSA-2017:1390 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1038552
Samba smbd Named Pipe Validation Flaw Lets Remote Authenticated Users Execute Arbitrary Code on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.samba.org/samba/security/CVE-2017-7494.html
Samba - Security Announcement ArchivePatch;Vendor Advisory
-
http://www.securityfocus.com/bid/98636
Samba CVE-2017-7494 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
HPESBNS03755 rev.2 - HPE NonStop Server using Samba, Multiple Remote VulnerabilitiesThird Party Advisory
-
https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1270
RHSA-2017:1270 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.debian.org/security/2017/dsa-3860
Debian -- Security Information -- DSA-3860-1 sambaThird Party Advisory
Jump to