Samba SMB Client Spoofing Vulnerability (CVE-2016-2115)
Samba SMB Client Spoofing Vulnerability (CVE-2016-2115)
Release date:
Updated on:
Affected Systems:
Samba Samba 4.x-4.2.11
Samba Samba 4.4.x-4.4.2
Samba Samba 4.3.x-4.3.8
Samba Samba 3.x
Description:
CVE (CAN) ID: CVE-2016-2115
Samba is a free software that implements the SMB protocol on Linux and UNIX systems. It consists of servers and client programs.
Samba 3.x, 4. x-4.2.11, 4.3.x-4.3.8, 4.4.x-4.4.2 versions do not require SMB signatures to be used in DCERPC sessions on ncacn_np. By modifying the data streams from the client to the server, man-in-the-middle attackers can fool the SMB client.
<* Source: Stefan Metzmacher
Link: https://www.samba.org/samba/security/CVE-2016-2115.html
*>
Suggestion:
Vendor patch:
Samba
-----
Samba has released a Security Bulletin (CVE-2016-2115) and patches for this:
CVE-2016-2115: SMB client connections for IPC traffic are not integrity protected
Link: https://www.samba.org/samba/security/CVE-2016-2115.html
Patch download: https://www.samba.org/samba/security/
------------------------------------ Split line ------------------------------------
How to share files with Samba in Ubuntu 14.04
The speed of accessing samba from Ubuntu dual Nic of VMWare Virtual Machine doubles
Add the Samba File Sharing Server to the Windows Server 2003 Domain
Samba installation Configuration
Samba service configuration in CentOS 6.2
Samba Server installation and configuration
How to Build the Win7 + VMware + Fedora18 Samba Server
------------------------------------ Split line ------------------------------------
Samba details: click here
Samba: click here
This article permanently updates the link address: