Bug 1589651 (CVE-2018-1139)

Summary: CVE-2018-1139 samba: Weak authentication protocol regression
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abokovoy, anoopcs, asn, gdeschner, jarrpa, jstephen, lmohanty, madam, rhs-smb, sankarshan, sbose, security-response-team, sisharma, ssaha, ssorce, vbellur
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: samba 4.7.9, samba 4.8.4 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way samba allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:28:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1614265, 1614744, 1617915, 1617916    
Bug Blocks: 1577167    

Description Huzaifa S. Sidhpurwala 2018-06-11 05:38:10 UTC
As per upstream advisory:

Samba releases 4.7.0 to 4.8.0 (inclusive) contain an error which allows authentication using NTLMv1 over an SMB1 transport, even when NTLMv1 is explicitly disabled. This problem does not occur over SMB2, it is a SMB1-only issue.

Normally, the use of NTLMv1 is disabled by default in favor of NTLMv2. This has been the default since Samba 4.5. A code restructuring in the NTLM authentication implementation of Samba in 4.7.0 caused this regression to occur.

Comment 2 Huzaifa S. Sidhpurwala 2018-06-11 05:45:40 UTC
Acknowledgments:

Name: Vivek Das (Red Hat)

Comment 4 Sam Fowler 2018-08-16 03:32:02 UTC
External Reference:

https://www.samba.org/samba/security/CVE-2018-1139.html

Comment 5 Sam Fowler 2018-08-16 07:14:30 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 1617916]

Comment 7 errata-xmlrpc 2018-09-04 06:29:23 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.4 for RHEL 7

Via RHSA-2018:2613 https://access.redhat.com/errata/RHSA-2018:2613

Comment 8 errata-xmlrpc 2018-09-04 06:31:46 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.4 for RHEL 6

Via RHSA-2018:2612 https://access.redhat.com/errata/RHSA-2018:2612

Comment 9 errata-xmlrpc 2018-10-30 07:26:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3056 https://access.redhat.com/errata/RHSA-2018:3056