Bug 1024547 - (CVE-2013-4476) CVE-2013-4476 samba: world-readable key.pem with Samba 4 AD DC
CVE-2013-4476 samba: world-readable key.pem with Samba 4 AD DC
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
  Show dependency treegraph
Reported: 2013-10-29 18:05 EDT by Vincent Danen
Modified: 2013-11-11 14:09 EST (History)
14 users (show)

See Also:
Fixed In Version: samba 4.0.11, samba 4.1.1
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-10-29 18:08:01 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-10-29 18:05:39 EDT
It was reported [1] that when Samba 4.x is used as an Active Directory Domain Controller (AD DC) that the /var/lib/samba/private/tls directory was world-readable.  This directory also contained the private openssl key (key.pem) used, and it also was world-readable.  This could allow a local user to obtain the private key of the Samba AD DC.

Note: this issue only affects Samba 4.x that is compiled as an Active Directory Domain Controller.  Current Fedora packages are not compiled in this way due to current Heimdal/MIT Kerberos incompatibilities [2].

[1] https://bugzilla.samba.org/show_bug.cgi?id=10234
[2] https://fedoraproject.org/wiki/Features/Samba4
Comment 1 Vincent Danen 2013-10-29 18:08:01 EDT

Not vulnerable. This issue did not affect the versions of samba or samba3x as shipped with Red Hat Enterprise Linux 5 and 6 as they did not include support for acting as an Active Directory Domain Controller.
Comment 3 Tomas Hoger 2013-11-11 13:59:31 EST
Public now via upstream advisory, fixed in upstream Samba versions 4.0.11 and 4.1.1.

External References:


Note You need to log in before you can comment on or make changes to this bug.