Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2118

Опубликовано: 12 апр. 2016
Источник: redhat
CVSS2: 6.8
EPSS Высокий

Описание

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."

A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6sambaAffected
Red Hat Enterprise Linux Extended Update Support 5.6samba3xAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportsambaFixedRHSA-2016:062512.04.2016
Red Hat Enterprise Linux 5samba3xFixedRHSA-2016:061312.04.2016
Red Hat Enterprise Linux 5sambaFixedRHSA-2016:062112.04.2016
Red Hat Enterprise Linux 5.6 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.6 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 5.9 Long LifesambaFixedRHSA-2016:062312.04.2016
Red Hat Enterprise Linux 5.9 Long Lifesamba3xFixedRHSA-2016:062412.04.2016
Red Hat Enterprise Linux 6sambaFixedRHSA-2016:061112.04.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1317990samba: SAMR and LSA man in the middle attacks

EPSS

Процентиль: 99%
0.78649
Высокий

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."

CVSS3: 7.5
nvd
больше 9 лет назад

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."

CVSS3: 7.5
debian
больше 9 лет назад

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x ...

CVSS3: 7.5
github
больше 3 лет назад

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."

CVSS3: 7.5
fstec
больше 9 лет назад

Уязвимость протокола MS-SAMR и MS-LSAD пакета программ сетевого взаимодействия Samba, связанная с недостатками элементов безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 99%
0.78649
Высокий

6.8 Medium

CVSS2