{"id":"MGASA-2016-0151","summary":"Updated samba packages fix security vulnerabilities","details":"Updated samba packages fix security vulnerability:\n\nJouni Knuutinen discovered that Samba contained multiple flaws in the\nDCE/RPC implementation. A remote attacker could use this issue to perform\na denial of service, downgrade secure connections by performing a man in\nthe middle attack, or possibly execute arbitrary code (CVE-2015-5370).\n\nStefan Metzmacher discovered that Samba contained multiple flaws in the\nNTLMSSP authentication implementation. A remote attacker could use this\nissue to downgrade connections to plain text by performing a man in the\nmiddle attack (CVE-2016-2110).\n\nAlberto Solino discovered that a Samba domain controller would establish a\nsecure connection to a server with a spoofed computer name. A remote\nattacker could use this issue to obtain sensitive information\n(CVE-2016-2111).\n\nStefan Metzmacher discovered that the Samba LDAP implementation did not\nenforce integrity protection. A remote attacker could use this issue to\nhijack LDAP connections by performing a man in the middle attack\n(CVE-2016-2112).\n\nStefan Metzmacher discovered that Samba did not enable integrity protection\nfor IPC traffic. A remote attacker could use this issue to perform a man in\nthe middle attack (CVE-2016-2115).\n\nStefan Metzmacher discovered that Samba incorrectly handled the MS-SAMR and\nMS-LSAD protocols. A remote attacker could use this flaw with a man in the\nmiddle attack to impersonate users and obtain sensitive information from\nthe Security Account Manager database. This flaw is known as Badlock\n(CVE-2016-2118).\n","modified":"2026-02-04T02:14:19.985422Z","published":"2016-04-26T18:02:43Z","related":["CVE-2015-5370","CVE-2016-2110","CVE-2016-2111","CVE-2016-2112","CVE-2016-2115","CVE-2016-2118"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0151.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18194"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2015-5370.html"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2016-2110.html"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2016-2111.html"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2016-2112.html"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2016-2115.html"},{"type":"REPORT","url":"https://www.samba.org/samba/security/CVE-2016-2118.html"},{"type":"REPORT","url":"http://www.ubuntu.com/usn/usn-2950-1/"}],"affected":[{"package":{"name":"samba","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/samba?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.25-2.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0151.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}