Samba 4.3.x < 4.3.13 / 4.4.x < 4.4.8 / 4.5.x < 4.5.3 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9857
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is running a version of Samba server that is affected by multiple vulnerabilities.


Versions of Samba 4.3.x prior to 4.3.13, 4.4.x prior to 4.4.8, and 4.5.x prior to 4.5.3 are unpatched, and therefore affected by the following vulnerabilities :

- An overflow condition exists in the 'ndr_pull_dnsp_name()' function in 'librpc/ndr/ndr_dnsp.c' that is triggered when handling 'dnsRecord' attributes of DNS objects. With a specially crafted request, an authenticated, remote attacker can cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists related to the client code always requesting a forwardable Kerberos ticket when performing Kerberos authentication. This may allow a service accepting the 'AP-REQ' from the client to perform the same actions as the client within the Kerberos TGT.
- A flaw exists in the 'check_pac_checksum()' function in 'auth/kerberos/kerberos_pac.c' that is triggered when handling Kerberos PAC (Privilege Attribute Certificate) validation. This may allow an authenticated, remote attacker to corrupt memory and crash the winbindd process.


Upgrade Samba to version 4.5.3 or later. If version 4.5.x cannot be obtained, versions 4.4.8, and 4.3.13 are also patched for these issues.

See Also

Plugin Details

Severity: High

ID: 9857

Family: Samba

Published: 1/9/2017

Updated: 3/6/2019

Dependencies: 8741

Nessus ID: 96142

Risk Information


Risk Factor: High

Base Score: 9

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Patch Publication Date: 12/19/2016

Vulnerability Publication Date: 12/19/2016

Reference Information

CVE: CVE-2016-2123, CVE-2016-2125, CVE-2016-2126

BID: 94994, 94988, 94970