CVE-2023-42669 s4-rpc_server: Disable rpcecho server by default
authorAndrew Bartlett <abartlet@samba.org>
Tue, 12 Sep 2023 06:59:44 +0000 (18:59 +1200)
committerJule Anger <janger@samba.org>
Mon, 9 Oct 2023 20:15:19 +0000 (22:15 +0200)
The rpcecho server is useful in development and testing, but should never
have been allowed into production, as it includes the facility to
do a blocking sleep() in the single-threaded rpc worker.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=15474

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
docs-xml/smbdotconf/protocol/dcerpcendpointservers.xml
lib/param/loadparm.c
selftest/target/Samba4.pm
source3/param/loadparm.c
source4/rpc_server/wscript_build

index 8a217cc7f118359d96498a20b1c198b38ff9ba21..c6642b795fd6c8bf11ad4923e3a04aa452744319 100644 (file)
@@ -6,6 +6,6 @@
        <para>Specifies which DCE/RPC endpoint servers should be run.</para>
 </description>
 
-<value type="default">epmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value>
+<value type="default">epmapper, wkssvc, samr, netlogon, lsarpc, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value>
 <value type="example">rpcecho</value>
 </samba:parameter>
index 16cb0d47f31e5e1f16e099ceca31997fc482ccf9..83b05260e09f4b651c676fde8d5cbb64d4a8e775 100644 (file)
@@ -2730,7 +2730,7 @@ struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
        lpcfg_do_global_parameter(lp_ctx, "ntvfs handler", "unixuid default");
        lpcfg_do_global_parameter(lp_ctx, "max connections", "0");
 
-       lpcfg_do_global_parameter(lp_ctx, "dcerpc endpoint servers", "epmapper wkssvc rpcecho samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver");
+       lpcfg_do_global_parameter(lp_ctx, "dcerpc endpoint servers", "epmapper wkssvc samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver");
        lpcfg_do_global_parameter(lp_ctx, "server services", "s3fs rpc nbt wrepl ldap cldap kdc drepl winbindd ntp_signd kcc dnsupdate dns");
        lpcfg_do_global_parameter(lp_ctx, "kccsrv:samba_kcc", "true");
        /* the winbind method for domain controllers is for both RODC
index d15156a538b25f73767c5de022d0308f7010a155..5687d2a85872049838d6c7890e0f805072059b07 100755 (executable)
@@ -783,7 +783,7 @@ sub provision_raw_step1($$)
        wins support = yes
        server role = $ctx->{server_role}
        server services = +echo $services
-        dcerpc endpoint servers = +winreg +srvsvc
+        dcerpc endpoint servers = +winreg +srvsvc +rpcecho
        notify:inotify = false
        ldb:nosync = true
        ldap server require strong auth = yes
index 12718ced9e7fb6d236a9de82277633b892c0f08e..e33751a27e315daff7e698fe86b7cbd4a9209724 100644 (file)
@@ -883,7 +883,7 @@ static void init_globals(struct loadparm_context *lp_ctx, bool reinit_globals)
 
        Globals.server_services = str_list_make_v3_const(NULL, "s3fs rpc nbt wrepl ldap cldap kdc drepl winbindd ntp_signd kcc dnsupdate dns", NULL);
 
-       Globals.dcerpc_endpoint_servers = str_list_make_v3_const(NULL, "epmapper wkssvc rpcecho samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver", NULL);
+       Globals.dcerpc_endpoint_servers = str_list_make_v3_const(NULL, "epmapper wkssvc samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver", NULL);
 
        Globals.tls_enabled = true;
        Globals.tls_verify_peer = TLS_VERIFY_PEER_AS_STRICT_AS_POSSIBLE;
index 0e44a3c2baed8e78faeaabf35302ae9eb3e2fb30..31ec4f60c9a6e114c3eebfb6eb5ef899a45e2c08 100644 (file)
@@ -33,7 +33,8 @@ bld.SAMBA_MODULE('dcerpc_rpcecho',
                  source='echo/rpc_echo.c',
                  subsystem='dcerpc_server',
                  init_function='dcerpc_server_rpcecho_init',
-                 deps='ndr-standard events'
+                 deps='ndr-standard events',
+                 enabled=bld.CONFIG_GET('ENABLE_SELFTEST')
                  )