• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Patches Samba Vulnerabilities In IBM i

    April 16, 2018 Alex Woodie

    Big Blue has issued two patches for serious flaws in IBM i’s implementation of Samba, flaws that could result in an attacker launching a denial of service attack or changing user’s passwords. The company patched IBM i 7.2 and 7.3, as support for IBM i 7.1 wanes.

    On April 3, IBM published a security bulletin informing users of the existence of two flaws in IBM i, as well as the existence of two program temporary fixes (PTFs) to patch the problems. Both of the flaws involve Samba, a free and open source implementation of the SMB/CIFS protocol to provide interoperability among different operating systems for file and print operations.

    The first flaw, identified as CVE-2018-1050, identifies missing null pointer checks when the remote procedure call (RPC) “spools” service in Samba 4.0 and later is configured to run as an external daemon. According to the Common Vulnerabilities and Exposures (CVE) database entry, this flaw could allow a hacker to cause the print spooler service to crash by sending malicious RPC messages.

    This denial of service (DOS) attack was first identified to IBM on March 13, according to the IBM X-Force report. Thanks to its network-based attack vector, lack of required privileges and user interaction, and its low complexity, it carries a CVSS Base Score of 7.5, making it a serious vulnerability.

    The second flaw, CVE-2018-1057, also impacts Samba 4.0, but in a different way. According to security researchers, a problem with the validation of permissions when Samba is used as an Active Directory (AD) domain controller (DC) could allow an authenticated user to change the passwords of any other users managed in an LDAP network, including administrative users and privileged service accounts.

    IBM first identified this vulnerability on March 13, according to IBM’s X-Force report. While it has a network origin, a low complexity level, and a high potential for impact the integrity of a server, the fact that a user must first be authenticated mitigates the impact somewhat, so it was given a CVSS Base Score of 6.5, making it a moderately serious threat.

    The fix for both flaws is to upgrade to a newer version of Samba that doesn’t suffer from the flaws. According to IBM, that means users should be on Samba version 4.5.16, 4.6.14, or 4.7.6. Luckily, IBM is making it easy for IBM i users by packaging a newer version of Samba that’s not impacted by the flaws into handy-dandy PTFS, including PTF number SI67329 for IBM i 7.2 and PTF number SI67330 for IBM i 7.3.

    It’s unclear if older releases of IBM i, including IBM i 7.1, 6.1, and i5/OS V5R4, are impacted by the Samba flaw. In any event, those releases are no longer supported by IBM, so there will be no patches forthcoming from IBM to fix any potential problems in those operating systems.

    While security flaws in core IBM i operating system components or Power Systems firmware components are rare (but not unheard of), the IBM i platform today is composed of many bits that are sourced from the open computing community. Over the past few years, there have been many vulnerabilities discovered in open source components that IBM incorporates into the IBM i and Power System platform.

    RELATED STORIES

    The Performance Impact Of Spectre And Meltdown

    IBM Patches ‘ROBOT’ Flaw in IBM i Crypto Library

    IBM Patches Another BIND Flaw In IBM i

    IBM Patches 28 More Security Vulns In JDK

    Have You Patched Those 35 Java Vulns on IBM i?

    IBM Patches 13 Security Vulnerabilities in IBM i JDK

    Keeping Up With Security Threats To IBM i

    IBM Patches OpenSSH Security Flaws That Impact IBM i

    IBM And ISVs Fight POODLE Vulnerability In SSL 3.0

    IBM Patches Heartbleed Vulnerability in Power Systems Firmware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: 6.1, Common Vulnerabilities and Exposures, Denial of Service, i5/OS V5R4, IBM i, IBM i 7.1, IBM i 7.2, IBM i 7.3, LDAP, Power Systems, PTFs, Samba, SMB/CIFS

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: RDi and Refactoring The Platform Matters More Than Ever, The Operating System Less So

    One thought on “IBM Patches Samba Vulnerabilities In IBM i”

    • Tony says:
      April 17, 2018 at 3:21 am

      Interesting near the end of the article, you say “It’s unclear if older releases of IBM i, including IBM i 7.1, 6.1, and i5/OS V5R4, are impacted by the Samba flaw. In any event, those releases are no longer supported by IBM, so there will be no patches forthcoming from IBM to fix any potential problems in those operating systems”.
      If I was paying for extended support, I would expect any known security problems to be fixed as this would surely come under defect support, which is being paid for and, to quote IBM regarding IBM Software Support Services – Service extension, “We also provide fixes for both new and existing defects”.

      Reply

    Leave a Reply Cancel reply

TFH Volume: 28 Issue: 29

This Issue Sponsored By

  • ProData Computer Services
  • Maxava
  • Software Concepts
  • COMMON
  • Manta Technologies

Table of Contents

  • The Platform Matters More Than Ever, The Operating System Less So
  • IBM Patches Samba Vulnerabilities In IBM i
  • Guru: RDi and Refactoring
  • As I See It: The Curse Of The Clever
  • Tesla Teases IBM i Software Vendor Into Some Experimental Coding

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32
  • You Can Now Get IBM Tech Support For VS Code For i
  • Price Cut On Power S1012 Mini Since Power S1112 Ain’t Coming Until 2026
  • IBM i: Pro and Con
  • As I See It: Disruption
  • IBM i PTF Guide, Volume 27, Number 30

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle