Your submission was sent successfully! Close

CVE-2016-2110

Published: 12 April 2016

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

Priority

Medium

CVSS 3 base score: 5.9

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
precise
Released (2:3.6.25-0ubuntu0.12.04.2)
trusty
Released (2:4.3.8+dfsg-0ubuntu0.14.04.2)
upstream
Released (4.4.2,4.3.8,4.2.11)
wily
Released (2:4.3.8+dfsg-0ubuntu0.15.10.2)
xenial
Released (2:4.3.8+dfsg-0ubuntu1)
yakkety
Released (2:4.3.8+dfsg-0ubuntu1)
zesty
Released (2:4.3.8+dfsg-0ubuntu1)
samba4
Launchpad, Ubuntu, Debian
precise Does not exist
(precise was needed)
trusty Does not exist

upstream Needs triage

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist