[3.3] samba: Client side SMB2/3 required signing can be downgraded (CVE-2016-2119)
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before
4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle
attackers to bypass a client-signing protection mechanism, and
consequently spoof SMB2 and SMB3 servers,
via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2)
SMB2_SESSION_FLAG_IS_NULL flag.
Fixed In Version:
samba 4.4.5, samba 4.3.11, samba 4.2.14
References:
https://www.samba.org/samba/security/CVE-2016-2119.html
(from redmine: issue id 5946, created on 2016-07-21, closed on 2016-08-09)
- Relations:
- parent #5944 (closed)
- Changesets:
- Revision af60c9f8 by Natanael Copa on 2016-07-22T08:27:45Z:
main/tevent: upgrade to 0.9.28
samba 4.2.14 requires tevent 0.9.28
ref #5946
- Revision 8c3dbd89 by Natanael Copa on 2016-07-22T08:33:13Z:
main/samba: security upgrade to 4.2.14 (CVE-2016-2119)
fixes #5946