VID |
23253 |
Severity |
30 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
The version of Samba running on the remote host is 4.4.x prior to 4.4.5. It is, therefore, affected by a flaw in libcli/smb/smbXcli_base.c that is triggered when handling SMB2 and SMB3 client onnections. A man-in-the-middle attacker can exploit this, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags, to downgrade the required signing for a client connection, allowing the attacker to spoof SMB2 and SMB3 servers.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: https://www.samba.org/samba/security/CVE-2016-2119.html http://www.samba.org/samba/history/samba-4.4.5.html
* Platforms Affected: Samba Project, Samba versions 4.4.x prior to 4.4.5. Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba 4.4.5 or later, available from the Samba Web site at https://www.samba.org/samba/download/ |
Related URL |
CVE-2016-2119 (CVE) |
Related URL |
91700 (SecurityFocus) |
Related URL |
(ISS) |
|