{"id":"USN-2950-1","summary":"samba vulnerabilities","details":"Jouni Knuutinen discovered that Samba contained multiple flaws in the\nDCE/RPC implementation. A remote attacker could use this issue to perform\na denial of service, downgrade secure connections by performing a \nmachine-in-the-middle attack, or possibly execute arbitrary code.\n(CVE-2015-5370)\n\nStefan Metzmacher discovered that Samba contained multiple flaws in the\nNTLMSSP authentication implementation. A remote attacker could use this\nissue to downgrade connections to plain text by performing a \nmachine-in-the-middle attack. (CVE-2016-2110)\n\nAlberto Solino discovered that a Samba domain controller would establish a\nsecure connection to a server with a spoofed computer name. A remote\nattacker could use this issue to obtain sensitive information.\n(CVE-2016-2111)\n\nStefan Metzmacher discovered that the Samba LDAP implementation did not\nenforce integrity protection. A remote attacker could use this issue to\nhijack LDAP connections by performing a machine-in-the-middle attack.\n(CVE-2016-2112)\n\nStefan Metzmacher discovered that Samba did not validate TLS certificates.\nA remote attacker could use this issue to spoof a Samba server.\n(CVE-2016-2113)\n\nStefan Metzmacher discovered that Samba did not enforce SMB signing even if\nconfigured to. A remote attacker could use this issue to perform a\nmachine-in-the-middle attack. (CVE-2016-2114)\n\nStefan Metzmacher discovered that Samba did not enable integrity protection\nfor IPC traffic. A remote attacker could use this issue to perform a\nmachine-in-the-middle attack. (CVE-2016-2115)\n\nStefan Metzmacher discovered that Samba incorrectly handled the MS-SAMR and\nMS-LSAD protocols. A remote attacker could use this flaw with a\nmachine-in-the-middle attack to impersonate users and obtain sensitive\ninformation from the Security Account Manager database. This flaw is known\nas Badlock. (CVE-2016-2118)\n\nSamba has been updated to 4.3.8 in Ubuntu 14.04 LTS and Ubuntu 15.10.\nUbuntu 12.04 LTS has been updated to 3.6.25 with backported security fixes.\n\nIn addition to security fixes, the updated packages contain bug fixes,\nnew features, and possibly incompatible changes. Configuration changes may\nbe required in certain environments.\n","modified":"2026-04-22T09:25:03.419827Z","published":"2016-04-18T12:16:29Z","related":["UBUNTU-CVE-2015-5370","UBUNTU-CVE-2016-2110","UBUNTU-CVE-2016-2111","UBUNTU-CVE-2016-2112","UBUNTU-CVE-2016-2113","UBUNTU-CVE-2016-2114","UBUNTU-CVE-2016-2115","UBUNTU-CVE-2016-2118"],"upstream":["CVE-2015-5370","CVE-2016-2110","CVE-2016-2111","CVE-2016-2112","CVE-2016-2113","CVE-2016-2114","CVE-2016-2115","CVE-2016-2118","UBUNTU-CVE-2015-5370","UBUNTU-CVE-2016-2110","UBUNTU-CVE-2016-2111","UBUNTU-CVE-2016-2112","UBUNTU-CVE-2016-2113","UBUNTU-CVE-2016-2114","UBUNTU-CVE-2016-2115","UBUNTU-CVE-2016-2118"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2950-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5370"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2110"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2112"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2113"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2114"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2115"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2118"}],"affected":[{"package":{"name":"samba","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/samba@2:4.3.8+dfsg-0ubuntu0.14.04.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.3.8+dfsg-0ubuntu0.14.04.2"}]}],"versions":["2:3.6.18-1ubuntu3","2:4.0.10+dfsg-4ubuntu2","2:4.0.13+dfsg-1ubuntu1","2:4.1.3+dfsg-2ubuntu2","2:4.1.3+dfsg-2ubuntu3","2:4.1.3+dfsg-2ubuntu4","2:4.1.3+dfsg-2ubuntu5","2:4.1.6+dfsg-1ubuntu1","2:4.1.6+dfsg-1ubuntu2","2:4.1.6+dfsg-1ubuntu2.14.04.1","2:4.1.6+dfsg-1ubuntu2.14.04.2","2:4.1.6+dfsg-1ubuntu2.14.04.3","2:4.1.6+dfsg-1ubuntu2.14.04.4","2:4.1.6+dfsg-1ubuntu2.14.04.5","2:4.1.6+dfsg-1ubuntu2.14.04.7","2:4.1.6+dfsg-1ubuntu2.14.04.8","2:4.1.6+dfsg-1ubuntu2.14.04.9","2:4.1.6+dfsg-1ubuntu2.14.04.11","2:4.1.6+dfsg-1ubuntu2.14.04.12","2:4.1.6+dfsg-1ubuntu2.14.04.13"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libnss-winbind","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libpam-smbpass","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libpam-winbind","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libparse-pidl-perl","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libsmbclient","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libsmbsharemodes0","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"libwbclient0","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"python-samba","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"registry-tools","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-common","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-common-bin","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-dsdb-modules","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-libs","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-testsuite","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"samba-vfs-modules","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"smbclient","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"},{"binary_name":"winbind","binary_version":"2:4.3.8+dfsg-0ubuntu0.14.04.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2950-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-5370"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2110"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2111"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2112"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2113"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2114"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2115"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2118"}]}}}],"schema_version":"1.7.5"}