Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2338e6b3-44d5-4d9e-bd94-e3b96534359d@catalyst.net.nz>
Date: Thu, 16 Oct 2025 07:51:00 +1300
From: Douglas Bagnall <douglas.bagnall@...alyst.net.nz>
To: oss-security@...ts.openwall.com
Subject: Samba security releases for CVE-2025-10230 and CVE-2025-9640

Last week I wrote:
> This is a heads-up that there will be Samba security updates for
> 4.21, 4.22, and 4.23 on Wednesday, October 15, 2025. Please make
> sure that your Samba servers will be updated soon after the release!
>
> Impacted component:
>  - AD DC (CVSS 10, High, when using a very unusual configuration)
>  - File services (CVSS 4.3, Low, in a widely used configuration)
>
> The AD DC bug will affect very few, possibly zero, users.

The fixes are now out.

These are

CVE-2025-10230 https://bugzilla.samba.org/show_bug.cgi?id=15903
CVE-2025-9640  https://bugzilla.samba.org/show_bug.cgi?id=15885

The first of which is the CVSS 10 one. I have included the
announcements here, which you can also see at

https://www.samba.org/samba/security/CVE-2025-10230.html
https://www.samba.org/samba/security/CVE-2025-9640.html

and various other places. There are patches on bugzilla and at
https://www.samba.org/samba/history/security.html.

I will reply with an explanation of how this came about.

Douglas


=================================================================
== Subject:      Command injection via WINS server hook script
==
== CVE ID#:     CVE-2025-10230
==
== Versions:    All versions since 4.0
==
== Summary:     If the 'wins hook' parameter is set on a domain
==              controller with the WINS server enabled,
==              unauthenticated remote code execution is possible.
=================================================================

===========
Description
===========

If a Samba server has WINS support enabled (it is off by default), and
it has a 'wins hook' parameter specified, the program specified by
that parameter will be run whenever a WINS name is changed.

The WINS server used by the Samba Active Directory Domain Controller
did not validate the names passed to the wins hook program, and it
passed them by inserting them into a string run by a shell.

WINS is an obsolete and trusting protocol, and clients can request any
name that fits within the 15 character NetBIOS limit. This includes
some shell metacharacters, making it possible to run arbitrary
commands on the host.

The WINS server used by Samba when it is not a domain controller is
unaffected.

==================
Patch Availability
==================

Patches addressing this issue have been posted to:

    https://www.samba.org/samba/security/

Additionally, Samba 4.23.2, 4.22.5, and 4.21.9 have been issued as
security releases to correct the defect. Samba administrators are
advised to upgrade to these releases or apply the patch as soon as
possible.

==================
CVSSv3 calculation
==================

CVSS:3.1: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H  (10.0)

==========
Workaround
==========

Avoid setting the 'wins hook' parameter in the smb.conf of a Samba AD
Domain Controller.

The 'wins hook' parameter is only effective when 'wins support' is
enabled. In other words, this combination is safe, regardless of 'wins
hook':

        server role = domain controller
        wins support = no

The default value for 'wins support' is 'no', so it is safe (though
pointless) for 'wins hook' occurs if 'wins support' does not.

It does NOT help to have 'wins hook' set to a non-existent or
non-executable path, but an explicitly empty value

        wins hook =

is OK.

When 'server role' is not 'domain controller' (or its synonyms 'active
directory domain controller', 'dc'), the server is not affected.
Specifically, 'member' or 'standalone' servers use a different WINS
server that is not vulnerable.

The 'wins hook' parameter is unlikely to be useful on a domain
controller, and administrators who use it might want to reconsider
that choice even on a patched server. It may not be supported in
future Samba releases.

=======
Credits
=======

Reported by Igor Morgenstern of Aisle Research.

Patches provided by Douglas Bagnall of the Samba team and Catalyst IT.

This advisory written by Douglas Bagnall.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================



===========================================================
== Subject:     uninitialized memory disclosure via vfs_streams_xattr
==
== CVE ID#:     CVE-2025-9640
==
== Versions:    All versions since 3.2
==
== Summary:     Uninitialised memory can be written into alternate data
==              streams, possibly leaking sensitive data.
===========================================================

===========
Description
===========

An authenticated user can read an unlimited number of samples of
discarded heap memory, due to a failure to initialise memory in
streams_xattr_pwrite() in the vfs_streams_xattr file server module.

This is achieved by issuing write requests that creates holes in the
file.

Samba erases known secrets before freeing the associated memory, which
somewhat mitigates the data leak.

==================
Patch Availability
==================

Patches addressing this issues have been posted to:

    https://www.samba.org/samba/security/

Additionally, Samba 4.23.2, 4.22.5, and 4.21.9 have been issued as
security releases to correct the defect. Samba administrators are
advised to upgrade to these releases or apply the patch as soon as
possible.

====================
CVSSv3.1 calculation
====================

AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (4.3)

==========
Workaround
==========

Systems that don't use vfs_streams_xattr are not affected. If you are
not sure, look for the string "streams_xattr" in your smb.conf. If
there is a line like this

    vfs objects = streams_xattr [and possibly other terms]

removing 'streams_xattr' from the 'vfs objects' list will avoid the
vulnerability but will affect functionality.

=======
Credits
=======

Reported and fixed by Andrew Walker of IX Systems and the Samba Team.

This advisory written by Douglas Bagnall of Catalyst IT and the Samba
Team.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.