Samba 3.5.x < 4.4 / 4.4.x < 4.4.14 / 4.5.x < 4.5.10 / 4.6.x < 4.6.4 Shared Library RCE

critical Nessus Plugin ID 100388


The remote Samba server is affected by a remote code execution vulnerability.


The version of Samba running on the remote host is 3.5.x prior to 4.4.x, or it is 4.4.x prior to 4.4.14, 4.5.x prior to 4.5.10, or 4.6.x prior to 4.6.4. It is, therefore, affected by an unspecified remote code execution vulnerability. An authenticated, remote attacker can exploit this, via a specially crafted shared library uploaded to a writable share, to cause the server to load and execute arbitrary code with root privileges.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Samba version 4.4.14 / 4.5.10 / 4.6.4 or later.

Alternatively, add the parameter 'nt pipe support = no' to the [global] section of the smb.conf and restart smbd. This prevents clients from accessing any named pipe endpoints. Note that this workaround can disable some expected functionality for Windows clients.

See Also

Plugin Details

Severity: Critical

ID: 100388

File Name: samba_4_6_4.nasl

Version: 1.14

Type: remote

Family: Misc.

Published: 5/24/2017

Updated: 11/13/2019

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Critical

Score: 9.2


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

CVSS Score Source: CVE-2017-7494


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: SMB/NativeLanManager, SMB/samba, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/24/2017

Vulnerability Publication Date: 5/24/2017

Exploitable With


Core Impact

Metasploit (Samba is_known_pipename() Arbitrary Module Load)

Reference Information

CVE: CVE-2017-7494

BID: 98636

EDB-ID: 42060, 42084