Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2110

Опубликовано: 12 апр. 2016
Источник: redhat
CVSS2: 4.3

Описание

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6sambaAffected
Red Hat Enterprise Linux Extended Update Support 5.6samba3xAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportsambaFixedRHSA-2016:062512.04.2016
Red Hat Enterprise Linux 5samba3xFixedRHSA-2016:061312.04.2016
Red Hat Enterprise Linux 5sambaFixedRHSA-2016:062112.04.2016
Red Hat Enterprise Linux 5.6 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.6 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 5.9 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.9 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 6sambaFixedRHSA-2016:061112.04.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1311893samba: Man-in-the-middle attacks possible with NTLMSSP authentication

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
nvd
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
debian
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before ...

suse-cvrf
больше 9 лет назад

Recommended update for samba

suse-cvrf
больше 9 лет назад

Recommended update for samba

4.3 Medium

CVSS2