samba: Client side SMB2/3 required signing can be downgraded (CVE-2016-2119)
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before
4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle
attackers to bypass a client-signing protection mechanism, and
consequently spoof SMB2 and SMB3 servers,
via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2)
SMB2_SESSION_FLAG_IS_NULL flag.
Fixed In Version:
samba 4.4.5, samba 4.3.11, samba 4.2.14
References:
https://www.samba.org/samba/security/CVE-2016-2119.html
(from redmine: issue id 5944, created on 2016-07-21, closed on 2016-08-09)
- Relations:
- child #5945 (closed)
- child #5946 (closed)
- child #5947 (closed)
- child #5948 (closed)