CVE-2016-2126Samba vulnerability

CWE-26410 documents8 sources
Severity
6.5MEDIUMNVD
OSV8.8
EPSS
4.7%
top 10.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 11
Latest updateMay 14

Description

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDsamba/samba4.0.04.3.13+2
debiandebian/samba< samba 2:4.5.2+dfsg-2 (bookworm)
Debiansamba/samba< 2:4.5.2+dfsg-2+3
Ubuntusamba/samba< 2:4.3.11+dfsg-0ubuntu0.14.04.4+1

🔴Vulnerability Details

3
GHSA
GHSA-j88p-975v-5qqh: Samba version 42022-05-14
OSV
CVE-2016-2126: Samba version 42017-05-11
OSV
samba vulnerabilities2016-12-19

📋Vendor Advisories

3
Ubuntu
Samba vulnerabilities2016-12-19
Red Hat
samba: Flaws in Kerberos PAC validation can trigger privilege elevation2016-12-19
Debian
CVE-2016-2126: samba - Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to inco...2016

💬Community

2
Bugzilla
CVE-2016-2125 CVE-2016-2126 samba: various flaws [fedora-all]2016-12-19
Bugzilla
CVE-2016-2126 samba: Flaws in Kerberos PAC validation can trigger privilege elevation2016-12-09