Samba SMB server Spoofing Vulnerability (CVE-2016-2114)
Samba SMB server Spoofing Vulnerability (CVE-2016-2114)
Release date:
Updated on:
Affected Systems:
Samba Samba 4.x-4.2.11
Samba Samba 4.4.x-4.4.2
Samba Samba 4.3.x-4.3.8
Samba Samba 3.x
Description:
CVE (CAN) ID: CVE-2016-2114
Samba is a free software that implements the SMB protocol on Linux and UNIX systems. It consists of servers and client programs.
Samba 3.x, 4. x-4.2.11, 4.3.x-4.3.8, 4.4.x-4.4.2 versions, SMB1 protocol does not recognize "server signing = mandatory" settings. By modifying the data stream from the client to the server, man-in-the-middle attackers can fool the SMB server.
<* Source: Stefan Metzmacher
Link: https://www.samba.org/samba/security/CVE-2016-2114.html
*>
Suggestion:
Vendor patch:
Samba
-----
Samba has released a Security Bulletin (CVE-2016-2114) and patches for this:
CVE-2016-2114: "server signing = mandatory" not enforced
Link: https://www.samba.org/samba/security/CVE-2016-2114.html
------------------------------------ Split line ------------------------------------
How to share files with Samba in Ubuntu 14.04
The speed of accessing samba from Ubuntu dual Nic of VMWare Virtual Machine doubles
Add the Samba File Sharing Server to the Windows Server 2003 Domain
Samba installation Configuration
Samba service configuration in CentOS 6.2
Samba Server installation and configuration
How to Build the Win7 + VMware + Fedora18 Samba Server
------------------------------------ Split line ------------------------------------
Samba details: click here
Samba: click here
This article permanently updates the link address: