Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

Impact of SMBLoris (ETR-2017-V005) on Centrify ADBindProxy and Samba

11 April,19 at 11:50 AM

Product: 

Centrify Server Suite (now part of Infrastructure Services), Centrify DirectControl, DirectControl Plugins 

 

Component:

Centrify ADBindProxy, Centrify DirectControl, DirectControl Plugins 

 

Summary:

 

Question: 
What is the impact of SMBLoris (ETR-2017-V005) on Centrify ADBindProxy and Samba?

Answer:
The SMBLoris (ETR-2017-V005) flaw is a DOS attack that allows an attacker to open a connection to a remote computer via the SMB protocol and instruct that computer to allocate RAM to handle the connection. The attacker doesn't have to be authenticated.
 
The vulnerability does not allow remote code execution, which means an attacker can't take over vulnerable computers, but only crash them, at best.
 
Since Centrify no longer distributes Samba, Centrify will not be providing a fix for this issue.

 

However, there are mitigation mechanisms available. For more information, please see KB-9060 or contact Centrify Support.

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.