CVE-2023-42669 s4-rpc_server: Disable rpcecho server by default
authorAndrew Bartlett <abartlet@samba.org>
Tue, 12 Sep 2023 06:59:44 +0000 (18:59 +1200)
committerJule Anger <janger@samba.org>
Sun, 8 Oct 2023 20:06:47 +0000 (22:06 +0200)
The rpcecho server is useful in development and testing, but should never
have been allowed into production, as it includes the facility to
do a blocking sleep() in the single-threaded rpc worker.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=15474

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
docs-xml/smbdotconf/protocol/dcerpcendpointservers.xml
lib/param/loadparm.c
selftest/target/Samba4.pm
source3/param/loadparm.c
source4/rpc_server/wscript_build

index 8a217cc7f118359d96498a20b1c198b38ff9ba21..c6642b795fd6c8bf11ad4923e3a04aa452744319 100644 (file)
@@ -6,6 +6,6 @@
        <para>Specifies which DCE/RPC endpoint servers should be run.</para>
 </description>
 
-<value type="default">epmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value>
+<value type="default">epmapper, wkssvc, samr, netlogon, lsarpc, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value>
 <value type="example">rpcecho</value>
 </samba:parameter>
index f70823fe36684e609e32df7cf8e30cbafa7896b4..664fae70c9b52067d883a55116e241f6b8d86e20 100644 (file)
@@ -2732,7 +2732,7 @@ struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
        lpcfg_do_global_parameter(lp_ctx, "ntvfs handler", "unixuid default");
        lpcfg_do_global_parameter(lp_ctx, "max connections", "0");
 
-       lpcfg_do_global_parameter(lp_ctx, "dcerpc endpoint servers", "epmapper wkssvc rpcecho samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver");
+       lpcfg_do_global_parameter(lp_ctx, "dcerpc endpoint servers", "epmapper wkssvc samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver");
        lpcfg_do_global_parameter(lp_ctx, "server services", "s3fs rpc nbt wrepl ldap cldap kdc drepl winbindd ntp_signd kcc dnsupdate dns");
        lpcfg_do_global_parameter(lp_ctx, "kccsrv:samba_kcc", "true");
        /* the winbind method for domain controllers is for both RODC
index 5cbc5ccf2b8931803937aed7616c763b0ffdc8f4..7033146f46a2cbe9e8f1b5dd27b622fac64757a6 100755 (executable)
@@ -782,7 +782,7 @@ sub provision_raw_step1($$)
        wins support = yes
        server role = $ctx->{server_role}
        server services = +echo $services
-        dcerpc endpoint servers = +winreg +srvsvc
+        dcerpc endpoint servers = +winreg +srvsvc +rpcecho
        notify:inotify = false
        ldb:nosync = true
        ldap server require strong auth = yes
index 97d02037a897c2a4d456b76b391006a761c8fd6c..1f7b6d16a783da944aef4745617266654aa56dc6 100644 (file)
@@ -883,7 +883,7 @@ static void init_globals(struct loadparm_context *lp_ctx, bool reinit_globals)
 
        Globals.server_services = str_list_make_v3_const(NULL, "s3fs rpc nbt wrepl ldap cldap kdc drepl winbindd ntp_signd kcc dnsupdate dns", NULL);
 
-       Globals.dcerpc_endpoint_servers = str_list_make_v3_const(NULL, "epmapper wkssvc rpcecho samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver", NULL);
+       Globals.dcerpc_endpoint_servers = str_list_make_v3_const(NULL, "epmapper wkssvc samr netlogon lsarpc drsuapi dssetup unixinfo browser eventlog6 backupkey dnsserver", NULL);
 
        Globals.tls_enabled = true;
        Globals.tls_verify_peer = TLS_VERIFY_PEER_AS_STRICT_AS_POSSIBLE;
index 0e44a3c2baed8e78faeaabf35302ae9eb3e2fb30..31ec4f60c9a6e114c3eebfb6eb5ef899a45e2c08 100644 (file)
@@ -33,7 +33,8 @@ bld.SAMBA_MODULE('dcerpc_rpcecho',
                  source='echo/rpc_echo.c',
                  subsystem='dcerpc_server',
                  init_function='dcerpc_server_rpcecho_init',
-                 deps='ndr-standard events'
+                 deps='ndr-standard events',
+                 enabled=bld.CONFIG_GET('ENABLE_SELFTEST')
                  )