CVE-2016-2124
Published: 9 November 2021
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Priority
Status
Package | Release | Status |
---|---|---|
samba
Launchpad, Ubuntu, Debian |
bionic |
Released
(2:4.7.6+dfsg~ubuntu-0ubuntu2.26)
|
focal |
Released
(2:4.13.14+dfsg-0ubuntu0.20.04.1)
|
|
hirsute |
Released
(2:4.13.14+dfsg-0ubuntu0.21.04.1)
|
|
impish |
Released
(2:4.13.14+dfsg-0ubuntu0.21.10.1)
|
|
jammy |
Released
(2:4.13.14+dfsg-0ubuntu1)
|
|
kinetic |
Released
(2:4.13.14+dfsg-0ubuntu1)
|
|
lunar |
Released
(2:4.13.14+dfsg-0ubuntu1)
|
|
mantic |
Released
(2:4.13.14+dfsg-0ubuntu1)
|
|
noble |
Released
(2:4.13.14+dfsg-0ubuntu1)
|
|
trusty |
Needed
|
|
upstream |
Released
(4.13.14)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |