Samba NTLMSSP protocol degradation vulnerability (CVE-2016-2110)
Samba NTLMSSP protocol degradation vulnerability (CVE-2016-2110)
Release date:
Updated on:
Affected Systems:
Samba Samba 4.x-4.2.11
Samba Samba 4.4.x-4.4.2
Samba Samba 4.3.x-4.3.8
Samba Samba 3.x
Description:
CVE (CAN) ID: CVE-2016-2110
Samba is a free software that implements the SMB protocol on Linux and UNIX systems. It consists of servers and client programs.
Samba 3.x, 4. x-4.2.11, 4.3.x-4.3.8, 4.4.x-4.4.2 versions, NTLMSSP authentication vulnerability. By modifying the data stream from the client to the server to delete the application layer identifier or encryption settings, man-in-the-middle attackers can perform protocol-based degradation attacks.
<* Source: Stefan Metzmacher
Link: https://www.samba.org/samba/security/CVE-2016-2110.html
*>
Suggestion:
Vendor patch:
Samba
-----
Samba has released a Security Bulletin (CVE-2016-2110) and patches for this:
CVE-2016-2110: Man in the middle attacks possible with NTLMSSP
Link: https://www.samba.org/samba/security/CVE-2016-2110.html
------------------------------------ Split line ------------------------------------
How to share files with Samba in Ubuntu 14.04
The speed of accessing samba from Ubuntu dual Nic of VMWare Virtual Machine doubles
Add the Samba File Sharing Server to the Windows Server 2003 Domain
Samba installation Configuration
Samba service configuration in CentOS 6.2
Samba Server installation and configuration
How to Build the Win7 + VMware + Fedora18 Samba Server
------------------------------------ Split line ------------------------------------
Samba details: click here
Samba: click here
This article permanently updates the link address: