CVE-2016-2111Authentication Bypass by Spoofing in Samba

Severity
6.3MEDIUMNVD
OSV5.9OSV4.3
EPSS
3.8%
top 11.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 25
Latest updateMay 17

Description

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.0 | Impact: 5.2

Affected Packages4 packages

debiandebian/samba< samba 2:4.3.7+dfsg-1 (bookworm)
Debiansamba/samba< 2:4.3.7+dfsg-1+3
Ubuntusamba/samba< 2:4.3.9+dfsg-0ubuntu0.14.04.1+4
NVDsamba/samba222 versions+221

Also affects: Ubuntu Linux 14.04, 15.10, 16.04

Patches

🔴Vulnerability Details

6
GHSA
GHSA-x65g-mfcj-xhc5: The NETLOGON service in Samba 32022-05-17
OSV
samba regression2016-05-25
OSV
samba regressions2016-05-04
OSV
libsoup2.4 update2016-05-04
OSV
CVE-2016-2111: The NETLOGON service in Samba 32016-04-25

📋Vendor Advisories

7
Ubuntu
Samba regression2016-05-25
Ubuntu
Samba regressions2016-05-18
Ubuntu
libsoup update2016-05-04
Ubuntu
Samba regressions2016-05-04
Ubuntu
Samba vulnerabilities2016-04-18

💬Community

2
Bugzilla
CVE-2015-5370 CVE-2016-2110 CVE-2016-2111 CVE-2016-2112 CVE-2016-2113 CVE-2016-2114 CVE-2016-2115 CVE-2016-2118 samba: various flaws [fedora-all]2016-04-12
Bugzilla
CVE-2016-2111 samba: Spoofing vulnerability when domain controller is configured2016-02-25