Korean
<< Back
VID 23253
Severity 30
Port 139
Protocol TCP
Class Samba
Detailed Description The version of Samba running on the remote host is 4.4.x prior to 4.4.5. It is, therefore, affected by a flaw in libcli/smb/smbXcli_base.c that is triggered when handling SMB2 and SMB3 client onnections. A man-in-the-middle attacker can exploit this, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags, to downgrade the required signing for a client connection, allowing the attacker to spoof SMB2 and SMB3 servers.

* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.

* References:
https://www.samba.org/samba/security/CVE-2016-2119.html
http://www.samba.org/samba/history/samba-4.4.5.html

* Platforms Affected:
Samba Project, Samba versions 4.4.x prior to 4.4.5.
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba 4.4.5 or later, available from the Samba Web site at https://www.samba.org/samba/download/
Related URL CVE-2016-2119 (CVE)
Related URL 91700 (SecurityFocus)
Related URL (ISS)