FreeBSD : samba -- multiple vulnerabilities (e4bc323f-cc73-11e6-b704-000c292e4fd8)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Samba team reports :

[CVE-2016-2123] Authenticated users can supply malicious dnsRecord
attributes on DNS objects and trigger a controlled memory corruption.

[CVE-2016-2125] Samba client code always requests a forwardable ticket
when using Kerberos authentication. This means the target server,
which must be in the current or trusted domain/realm, is given a valid
general purpose Kerberos 'Ticket Granting Ticket' (TGT), which can be
used to fully impersonate the authenticated user or service.

[CVE-2016-2126] A remote, authenticated, attacker can cause the
winbindd process to crash using a legitimate Kerberos ticket due to
incorrect handling of the PAC checksum. A local service with access to
the winbindd privileged pipe can cause winbindd to cache elevated
access permissions.

See also :

Solution :

Update the affected packages.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 96164 ()

Bugtraq ID:

CVE ID: CVE-2016-2123

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now