vulnerability

CentOS: (CVE-2016-2111) (Multiple Advisories): samba

Severity
4
CVSS
(AV:A/AC:M/Au:N/C:P/I:P/A:N)
Published
Apr 13, 2016
Added
Jul 6, 2016
Modified
May 7, 2019

Description

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.

Solutions

centos-upgrade-ctdbcentos-upgrade-ctdb-develcentos-upgrade-ctdb-testscentos-upgrade-libsmbclientcentos-upgrade-libsmbclient-develcentos-upgrade-libwbclientcentos-upgrade-libwbclient-develcentos-upgrade-sambacentos-upgrade-samba-clientcentos-upgrade-samba-client-libscentos-upgrade-samba-commoncentos-upgrade-samba-common-libscentos-upgrade-samba-common-toolscentos-upgrade-samba-dccentos-upgrade-samba-dc-libscentos-upgrade-samba-develcentos-upgrade-samba-doccentos-upgrade-samba-domainjoin-guicentos-upgrade-samba-glusterfscentos-upgrade-samba-libscentos-upgrade-samba-pidlcentos-upgrade-samba-pythoncentos-upgrade-samba-swatcentos-upgrade-samba-testcentos-upgrade-samba-test-develcentos-upgrade-samba-test-libscentos-upgrade-samba-vfs-glusterfscentos-upgrade-samba-winbindcentos-upgrade-samba-winbind-clientscentos-upgrade-samba-winbind-develcentos-upgrade-samba-winbind-krb5-locatorcentos-upgrade-samba-winbind-modulescentos-upgrade-samba3xcentos-upgrade-samba3x-clientcentos-upgrade-samba3x-commoncentos-upgrade-samba3x-doccentos-upgrade-samba3x-domainjoin-guicentos-upgrade-samba3x-swatcentos-upgrade-samba3x-winbindcentos-upgrade-samba3x-winbind-devel
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.