vulnerability

Red Hat: CVE-2016-2125: Moderate: samba security and bug fix update (Multiple Advisories)

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:P/I:N/A:N)
Published
Dec 19, 2016
Added
Mar 21, 2017
Modified
Jul 9, 2025

Description

It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.

Solution(s)

no-fix-redhat-rpm-packageredhat-upgrade-ctdbredhat-upgrade-ctdb-testsredhat-upgrade-libsmbclientredhat-upgrade-libsmbclient-develredhat-upgrade-libwbclientredhat-upgrade-libwbclient-develredhat-upgrade-sambaredhat-upgrade-samba-clientredhat-upgrade-samba-client-libsredhat-upgrade-samba-commonredhat-upgrade-samba-common-libsredhat-upgrade-samba-common-toolsredhat-upgrade-samba-dcredhat-upgrade-samba-dc-libsredhat-upgrade-samba-debuginforedhat-upgrade-samba-develredhat-upgrade-samba-docredhat-upgrade-samba-domainjoin-guiredhat-upgrade-samba-glusterfsredhat-upgrade-samba-krb5-printingredhat-upgrade-samba-libsredhat-upgrade-samba-pidlredhat-upgrade-samba-pythonredhat-upgrade-samba-swatredhat-upgrade-samba-testredhat-upgrade-samba-test-libsredhat-upgrade-samba-vfs-glusterfsredhat-upgrade-samba-winbindredhat-upgrade-samba-winbind-clientsredhat-upgrade-samba-winbind-develredhat-upgrade-samba-winbind-krb5-locatorredhat-upgrade-samba-winbind-modulesredhat-upgrade-samba4redhat-upgrade-samba4-clientredhat-upgrade-samba4-commonredhat-upgrade-samba4-dcredhat-upgrade-samba4-dc-libsredhat-upgrade-samba4-debuginforedhat-upgrade-samba4-develredhat-upgrade-samba4-libsredhat-upgrade-samba4-pidlredhat-upgrade-samba4-pythonredhat-upgrade-samba4-testredhat-upgrade-samba4-winbindredhat-upgrade-samba4-winbind-clientsredhat-upgrade-samba4-winbind-krb5-locator
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.