Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2111

Опубликовано: 12 апр. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6sambaAffected
Red Hat Enterprise Linux Extended Update Support 5.6samba3xAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportsambaFixedRHSA-2016:062512.04.2016
Red Hat Enterprise Linux 5samba3xFixedRHSA-2016:061312.04.2016
Red Hat Enterprise Linux 5sambaFixedRHSA-2016:062112.04.2016
Red Hat Enterprise Linux 5.6 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.6 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 5.9 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.9 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 6sambaFixedRHSA-2016:061112.04.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=1311902samba: Spoofing vulnerability when domain controller is configured

EPSS

Процентиль: 89%
0.05161
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 9 лет назад

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

CVSS3: 6.3
nvd
больше 9 лет назад

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

CVSS3: 6.3
debian
больше 9 лет назад

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before ...

CVSS3: 6.3
github
больше 3 лет назад

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

CVSS3: 6.4
fstec
больше 9 лет назад

Уязвимость службы NETLOGON пакета программ сетевого взаимодействия Samba, связанная с недостатках элементов безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

EPSS

Процентиль: 89%
0.05161
Низкий

4.3 Medium

CVSS2