A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2019660 | Issue Tracking Patch Third Party Advisory |
| https://www.samba.org/samba/security/CVE-2016-2124.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2022-02-18 18:15
Updated : 2022-02-25 16:28
NVD link : CVE-2016-2124
Mitre link : CVE-2016-2124
JSON object : View
Products Affected
redhat
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
- virtualization_host
- enterprise_linux_server_aus
- enterprise_linux_for_ibm_z_systems
- codeready_linux_builder
- enterprise_linux_server_tus
- enterprise_linux_tus
- enterprise_linux_eus
- enterprise_linux_for_power_big_endian
- gluster_storage
- enterprise_linux_for_scientific_computing
- enterprise_linux
- openstack
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_resilient_storage
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems_eus
debian
- debian_linux
canonical
- ubuntu_linux
fedoraproject
- fedora
samba
- samba
CWE
CWE-287
Improper Authentication
