vulnerability
F5 Networks: K53313971 (CVE-2016-2110): Samba vulnerabilities CVE-2016-2110 and CVE-2016-2115
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 24, 2016 | Feb 16, 2017 | Feb 1, 2018 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 24, 2016
Added
Feb 16, 2017
Modified
Feb 1, 2018
Description
The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
Solution
f5-big-ip-upgrade-latest
References
- URL-https://support.f5.com/csp/article/K53313971
- SUSE-SUSE-SU-2016:1022
- SUSE-SUSE-SU-2016:1023
- SUSE-SUSE-SU-2016:1024
- SUSE-SUSE-SU-2016:1028
- SUSE-SUSE-SU-2016:1105
- REDHAT-RHSA-2016:0611
- REDHAT-RHSA-2016:0612
- REDHAT-RHSA-2016:0613
- REDHAT-RHSA-2016:0614
- REDHAT-RHSA-2016:0618
- REDHAT-RHSA-2016:0619
- REDHAT-RHSA-2016:0620
- REDHAT-RHSA-2016:0621
- REDHAT-RHSA-2016:0623
- REDHAT-RHSA-2016:0624
- REDHAT-RHSA-2016:0625
- DEBIAN-DSA-3548
- SECTRACK-1035533
- UBUNTU-USN-2950-1
- UBUNTU-USN-2950-2
- UBUNTU-USN-2950-3
- UBUNTU-USN-2950-4
- UBUNTU-USN-2950-5
- GENTOO-GLSA-201612-47
- NVD-CVE-2016-2110

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.