{"id":"CVE-2016-2124","details":"A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.","modified":"2026-03-14T09:19:18.313855Z","published":"2022-02-18T18:15:08.237Z","related":["ALSA-2021:5082","MGASA-2021-0585","SUSE-SU-2021:3647-1","SUSE-SU-2021:3649-1","SUSE-SU-2021:3650-1","SUSE-SU-2021:3673-1","SUSE-SU-2021:3674-1","SUSE-SU-2021:3746-1","SUSE-SU-2021:3747-1","SUSE-SU-2022:0361-1","openSUSE-SU-2021:1471-1","openSUSE-SU-2021:3647-1","openSUSE-SU-2021:3650-1","openSUSE-SU-2021:3674-1","openSUSE-SU-2024:11631-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-06"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2016-2124.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"c541b9eac581c74fe694f061dc27a9aa0cd4ca43"},{"fixed":"db11778b57610e24324aa4342f89918f66157d71"},{"introduced":"9b49519cae3e967af9ea48dc5fcfb6c145e31db4"},{"fixed":"9312b1832e5a808a63fc7f9e7d6e70348cc9eb86"},{"introduced":"fc8342bd26d1c55ca5780b427f675f31147b27f9"},{"fixed":"7d0c030d4233974c4b9463dad44efdb05e6186f1"},{"introduced":"0"},{"last_affected":"4fba936a8ab9afbdb7eaf2789d57850fbec35a77"},{"introduced":"0"},{"last_affected":"d82b72a5a5d7c1585a39f3a9530ff8861bfda45a"},{"introduced":"0"},{"last_affected":"192c05556f786b4523fb325cee6d87b251aee059"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"4.13.14"},{"introduced":"4.14.0"},{"fixed":"4.14.10"},{"introduced":"4.15.0"},{"fixed":"4.15.2"},{"introduced":"0"},{"last_affected":"3.0"},{"introduced":"0"},{"last_affected":"3.5"},{"introduced":"0"},{"last_affected":"4.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2124.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"16.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}