cve/2016/CVE-2016-2118.md

27 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-2118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
### POC
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2950-3
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://www.kb.cert.org/vuls/id/813296
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2016-2118
- https://github.com/cfengine-content/registry
- https://github.com/digitronik/rh-sec-data
- https://github.com/nickanderson/cfengine-CVE-2016-2118
- https://github.com/santsys/aruba-clearpass-api
- https://github.com/trend-anz/Deep-Security-Open-Patch