It was reported [1] that Samba's pam_winbind module would fail open (allowing access) when the require_membership_of option is used as an argument to pam_winbind, and contains a non-existent group as the value. In such a configuration, rather then failing and not permitting authentication which is what would be expected, pam_winbind will allow authentication to proceed. For instance, if the following is specified and the user is not a member of the group 'Admin', they will not obtain access to the system: auth sufficient pam_winbind.so use_first_pass require_membership_of=Admin On the other hand, if the non-existent group 'AdminOops' is specified, the user is obviously not a member of said group, authentication will be permitted: auth sufficient pam_winbind.so use_first_pass require_membership_of=AdminOops The commit [2] that most likely introduced this flaw indicates that this was introduced October 2009 and another commit [3] looks like the fix, although that is for another bug [4] that's somewhat related to this issue and somewhat not. [1] https://lists.samba.org/archive/samba-technical/2012-June/084593.html [2] http://git.samba.org/?p=samba.git;a=commit;h=31f1a36901b5b8959dc51401c09c114829b50392 [3] http://git.samba.org/?p=samba.git;a=commitdiff;h=f62683956a3b182f6a61cc7a2b4ada2e74cde243 [4] https://bugzilla.samba.org/show_bug.cgi?id=8598
CVE request: http://www.openwall.com/lists/oss-security/2013/12/02/5
Dave put the wrong BUG URL into the commit message. It is https://bugzilla.samba.org/show_bug.cgi?id=10300
Acknowledgements: Red Hat would like to thank Sam Richardson for reporting this issue.
Also note that you must successfully authenticate, meaning you must have or know a username/password to authenticate with. This just breaks group membership validation post-successful authentication.
Reference: http://www.samba.org/samba/security/CVE-2012-6150
Created samba tracking bugs for this issue: Affects: fedora-all [bug 1039500]
Statement: (none)
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0330 https://rhn.redhat.com/errata/RHSA-2014-0330.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0383 https://rhn.redhat.com/errata/RHSA-2014-0383.html