Samba CVE-2017-7494
Explained & Recommended Actions

The CVE-2017-7494 vulnerability affects versions 3.5 (released March 1, 2010) and onwards of Samba, the defacto standard for providing Windows-based file and print services on Unix and Linux systems.

We've compiled the following resources to help you determine if you are vulnerable and understand what you can do to protect yourself. This page will continue to be updated as more information and resources become available. 

For specific questions or further assistance, please contact us at +1–866–7RAPID7 (Toll Free) or +1–617–247–1717. Get international contact information here.

>

Samba CVE-2017-7494 Resources

[BLOG] Patching CVE-2017-7494 in Samba: It’s the Circle of Life
Who is affected by Samba? How bad is it? And what can you do to protect yourself? 

[BLOG] Scanning and Remediating Samba CVE-2017-7494 in InsightVM and Nexpose
Learn how to use InsightVM or Nexpose to create specific scan templates, dynamic asset groups, dashboards, and remediation projects for CVE-2017-7494 to ensure you can discover and track remediation. 

[VIDEO] Samba CVE-2017-7494 Explained
In this special edition of Whiteboard Wednesday, Matt Hathaway, Director of IDR Solutions Marketing, addresses the Samba vulnerability and preventive steps to protect your network.

[WEBCAST] Understanding & Patching Samba | Friday, May 26 at 2:00pm ET
Join Jeremiah Dewey, rapid7’s director of incident response, to learn:  

  • What is Samba
  • Who is affected?
  • How bad is it?
  • How do you protect yourself?

Webcast: Understanding & Patching Samba

Friday, May 26 at 2:00pm ET

Register Now

Find out if you're vulnerable with InsightVM

Free 30-Day Trial

Get it Now