Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2110

Опубликовано: 25 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4.3
CVSS3: 5.9

Описание

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

РелизСтатусПримечание
devel

released

2:4.3.8+dfsg-0ubuntu1
esm-infra-legacy/trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
esm-infra/xenial

released

2:4.3.8+dfsg-0ubuntu1
precise

released

2:3.6.25-0ubuntu0.12.04.2
precise/esm

not-affected

2:3.6.25-0ubuntu0.12.04.2
trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
trusty/esm

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
upstream

released

4.4.2,4.3.8,4.2.11
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 95%
0.19664
Средний

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
nvd
почти 10 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

CVSS3: 5.9
debian
почти 10 лет назад

The NTLMSSP authentication implementation in Samba 3.x and 4.x before ...

suse-cvrf
больше 9 лет назад

Recommended update for samba

suse-cvrf
больше 9 лет назад

Recommended update for samba

EPSS

Процентиль: 95%
0.19664
Средний

4.3 Medium

CVSS2

5.9 Medium

CVSS3