cvelist/2016/2xxx/CVE-2016-2124.json
2023-09-17 09:00:34 +00:00

77 lines
2.5 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2016-2124",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "samba",
"version": {
"version_data": [
{
"version_value": "samba 4.15.2, samba 4.14.10, samba 4.13.14"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
},
{
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2016-2124.html",
"url": "https://www.samba.org/samba/security/CVE-2016-2124.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202309-06",
"url": "https://security.gentoo.org/glsa/202309-06"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required."
}
]
}
}