Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2110

Опубликовано: 25 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4.3
CVSS3: 5.9

Описание

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

РелизСтатусПримечание
devel

released

2:4.3.8+dfsg-0ubuntu1
esm-infra-legacy/trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
esm-infra/xenial

released

2:4.3.8+dfsg-0ubuntu1
precise

released

2:3.6.25-0ubuntu0.12.04.2
precise/esm

not-affected

2:3.6.25-0ubuntu0.12.04.2
trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
trusty/esm

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
upstream

released

4.4.2,4.3.8,4.2.11
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 95%
0.16935
Средний

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
nvd
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
debian
больше 9 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before ...

suse-cvrf
больше 9 лет назад

Recommended update for samba

suse-cvrf
больше 9 лет назад

Recommended update for samba

EPSS

Процентиль: 95%
0.16935
Средний

4.3 Medium

CVSS2

5.9 Medium

CVSS3