Lucene search

K
f5F5F5:K53313971
HistoryMay 17, 2016 - 12:00 a.m.

K53313971 : Samba vulnerabilities CVE-2016-2110 and CVE-2016-2115

2016-05-1700:00:00
my.f5.com
30

6.8 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.9%

Security Advisory Description

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
Impact
Samba tools are included with vulnerable releases; however, F5 products are not affected by this vulnerability in any standard configuration. There is a theoretical attack vector if the user manually enables vulnerable components.