Samba Badlock Vulnerability

Medium Nessus Plugin ID 90509

Synopsis

An SMB server running on the remote host is affected by the Badlock
vulnerability.

Description

The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services.

Solution

Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.

See Also

http://badlock.org

https://www.samba.org/samba/security/CVE-2016-2118.html

Plugin Details

Severity: Medium

ID: 90509

File Name: samba_badlock.nasl

Version: 1.6

Type: remote

Family: General

Published: 2016/04/13

Modified: 2018/07/27

Dependencies: 25240

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/04/12

Vulnerability Publication Date: 2016/03/23

Reference Information

CVE: CVE-2016-2118

BID: 86002

CERT: 813296