Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2114

Опубликовано: 25 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

РелизСтатусПримечание
devel

released

2:4.3.8+dfsg-0ubuntu1
esm-infra-legacy/trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
esm-infra/xenial

released

2:4.3.8+dfsg-0ubuntu1
precise

not-affected

precise/esm

not-affected

trusty

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
trusty/esm

released

2:4.3.8+dfsg-0ubuntu0.14.04.2
upstream

released

4.4.2,4.3.8,4.2.11
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 92%
0.09085
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
nvd
почти 10 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
debian
почти 10 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x bef ...

CVSS3: 5.9
github
больше 3 лет назад

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.

CVSS3: 5.9
fstec
почти 10 лет назад

Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с недостатками элементов безопасности, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 92%
0.09085
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3