Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2114

Опубликовано: 25 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

РелизСтатусПримечание
devel

released

2:4.3.8+dfsg-0ubuntu1
esm-infra-legacy/trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
esm-infra/xenial

released

2:4.3.8+dfsg-0ubuntu1
precise

not-affected

precise/esm

not-affected

trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
trusty/esm

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
upstream

released

4.4.2,4.3.8,4.2.11
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 92%
0.08894
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
nvd
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
debian
больше 9 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x bef ...

CVSS3: 5.9
github
больше 3 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
fstec
больше 9 лет назад

Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с недостатками элементов безопасности, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 92%
0.08894
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3