A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2019660 | Issue Tracking Patch Third Party Advisory |
https://www.samba.org/samba/security/CVE-2016-2124.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2022-02-18 10:15
Updated : 2022-02-25 08:28
NVD link : CVE-2016-2124
Mitre link : CVE-2016-2124
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
redhat
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_update_services_for_sap_solutions
- virtualization_host
- enterprise_linux
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_tus
- enterprise_linux_server_aus
- openstack
- enterprise_linux_for_scientific_computing
- enterprise_linux_workstation
- codeready_linux_builder
- gluster_storage
- enterprise_linux_resilient_storage
- enterprise_linux_desktop
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_big_endian
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
canonical
- ubuntu_linux
fedoraproject
- fedora
samba
- samba
debian
- debian_linux