This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Samba team reports :
[CVE-2015-5370] Errors in Samba DCE-RPC code can lead to denial of
service (crashes and high cpu consumption) and man in the middle
[CVE-2016-2110] The feature negotiation of NTLMSSP is not downgrade
protected. A man in the middle is able to clear even required flags,
especially NTLMSSP_NEGOTIATE_SIGN and NTLMSSP_NEGOTIATE_SEAL.
[CVE-2016-2111] When Samba is configured as Domain Controller it
allows remote attackers to spoof the computer name of a secure
channel's endpoints, and obtain sensitive session information, by
running a crafted application and leveraging the ability to sniff
[CVE-2016-2112] A man in the middle is able to downgrade LDAP
connections to no integrity protection.
[CVE-2016-2113] Man in the middle attacks are possible for client
triggered LDAP connections (with ldaps://) and ncacn_http connections
[CVE-2016-2114] Due to a bug Samba doesn't enforce required smb
signing, even if explicitly configured.
[CVE-2016-2115] The protection of DCERPC communication over ncacn_np
(which is the default for most the file server related protocols) is
inherited from the underlying SMB connection.
[CVE-2016-2118] a.k.a. BADLOCK. A man in the middle can intercept any
DCERPC traffic between a client and a server in order to impersonate
the client and get the same privileges as the authenticated user
account. This is most problematic against active directory domain
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 90474 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now