CVE Vulnerabilities

CVE-2016-2126

Published: May 11, 2017 | Modified: Apr 20, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
2.3 MODERATE
AV:A/AC:M/Au:S/C:N/I:N/A:P
RedHat/V3
3.5 MODERATE
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.

Affected Software

NameVendorStart VersionEnd Version
SambaSamba4.0.0 (including)4.3.13 (excluding)
SambaSamba4.4.0 (including)4.4.8 (excluding)
SambaSamba4.5.0 (including)4.5.3 (excluding)
Red Hat Enterprise Linux 6RedHatsamba-0:3.6.23-41.el6*
Red Hat Enterprise Linux 6RedHatsamba4-0:4.2.10-9.el6*
Red Hat Enterprise Linux 7RedHatsamba-0:4.4.4-13.el7_3*
Red Hat Gluster Storage 3.2 for RHEL 6RedHatsamba-0:4.4.6-4.el6rhs*
Red Hat Gluster Storage 3.2 for RHEL 7RedHatsamba-0:4.4.6-4.el7rhgs*
SambaUbuntudevel*
SambaUbuntuesm-infra-legacy/trusty*
SambaUbuntuesm-infra/xenial*
SambaUbuntutrusty*
SambaUbuntutrusty/esm*
SambaUbuntuxenial*
SambaUbuntuyakkety*
SambaUbuntuzesty*
Samba4Ubuntuprecise*

References