Ask the Community
Groups
CVE-2016-2118: Samba Badlock vulnerability - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2016-2118</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database.<br><br>Unitrends risk assessment: Severity Low<br><br>The samba configuration on Unitrends systems is using share security with restriction by IP address, so there is no samba user/password information to be revealed. This is a much greater risk on Windows systems or with Active Directory.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Fixed in CentOS6 update versions: samba-3.6.23-30.el6_7<br><br>To apply the fix, download the latest Unitrends security update from the ftp site.<br> </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2016-2118%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2016-0611.html%250D%250Ahttps%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2016-2118">https://access.redhat.com/security/cve/cve-2016-2118 https://rhn.redhat.com/errata/RHSA-2016-0611.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2118</a></li></ul> </article> </main>