CVE-2016-2118
12.04.2016, 23:59
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."Enginsight
Vendor | Product | Version |
---|---|---|
samba | samba | 3.6.0 ≤ 𝑥 < 4.2.10 |
samba | samba | 4.3.0 ≤ 𝑥 < 4.3.7 |
samba | samba | 4.4.0 ≤ 𝑥 < 4.4.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 16.04 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
samba |
| ||||||||||||
samba4 |
|
Common Weakness Enumeration