### [CVE-2016-2118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK." ### POC #### Reference - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://www.ubuntu.com/usn/USN-2950-3 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes - https://www.kb.cert.org/vuls/id/813296 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Live-Hack-CVE/CVE-2016-2118 - https://github.com/cfengine-content/registry - https://github.com/digitronik/rh-sec-data - https://github.com/nickanderson/cfengine-CVE-2016-2118 - https://github.com/santsys/aruba-clearpass-api - https://github.com/trend-anz/Deep-Security-Open-Patch