Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2114

Опубликовано: 12 апр. 2016
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4sambaNot affected
Red Hat Enterprise Linux 5sambaNot affected
Red Hat Enterprise Linux 5samba3xNot affected
Red Hat Enterprise Linux 6sambaNot affected
Red Hat Enterprise Linux Extended Update Support 5.6sambaNot affected
Red Hat Enterprise Linux Extended Update Support 5.6samba3xNot affected
Red Hat Enterprise Linux Extended Update Support 5.9sambaNot affected
Red Hat Enterprise Linux Extended Update Support 5.9samba3xNot affected
Red Hat Enterprise Linux Extended Update Support 6.2sambaNot affected
Red Hat Enterprise Linux Extended Update Support 6.4sambaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1312082samba: Samba based active directory domain controller does not enforce smb signing

EPSS

Процентиль: 92%
0.08894
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
nvd
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
debian
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x bef ...

CVSS3: 5.9
github
больше 3 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
fstec
больше 9 лет назад

Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с недостатками элементов безопасности, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 92%
0.08894
Низкий

5.8 Medium

CVSS2