Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2016-2123
HistoryNov 01, 2018 - 1:29 p.m.

CVE-2016-2123

2018-11-0113:29:00
Debian Security Bug Tracker
security-tracker.debian.org
23

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.941

Percentile

99.2%

A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba< 2:4.5.2+dfsg-2samba_2:4.5.2+dfsg-2_all.deb
Debian11allsamba< 2:4.5.2+dfsg-2samba_2:4.5.2+dfsg-2_all.deb
Debian999allsamba< 2:4.5.2+dfsg-2samba_2:4.5.2+dfsg-2_all.deb
Debian13allsamba< 2:4.5.2+dfsg-2samba_2:4.5.2+dfsg-2_all.deb

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.941

Percentile

99.2%