A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2019660 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html | |
https://security.gentoo.org/glsa/202309-06 | |
https://www.samba.org/samba/security/CVE-2016-2124.html | Mitigation Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2019660 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html | |
https://security.gentoo.org/glsa/202309-06 | |
https://www.samba.org/samba/security/CVE-2016-2124.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2022-02-18 18:15
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2124
Mitre link : CVE-2016-2124
CVE.ORG link : CVE-2016-2124
JSON object : View
Products Affected
redhat
- virtualization_host
- enterprise_linux_workstation
- enterprise_linux_server_aus
- openstack
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_resilient_storage
- enterprise_linux_for_scientific_computing
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_server_tus
- enterprise_linux_tus
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux
- enterprise_linux_server
- enterprise_linux_for_power_little_endian_eus
- codeready_linux_builder
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_power_big_endian
- gluster_storage
- enterprise_linux_for_ibm_z_systems_eus
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
samba
- samba
CWE
CWE-287
Improper Authentication