Buffer overflow in Samba - CVE-2016-2126
Published: May 23, 2017 / Updated: May 23, 2017
Vulnerability identifier: #VU6629
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-2126
CWE-ID: CWE-119
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: Samba
Affected software:
Samba
Samba
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to escalate privileges.
The vulnerability exists due to a boundary error within Kerberos PAC validation process in winbindd. A remote authenticated attacker can send a specially crafted request to vulnerable Samba server, trigger buffer overflow and execute arbitrary code on the server with elevated privileges.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code with elevated privileges.
The vulnerability exists due to a boundary error within Kerberos PAC validation process in winbindd. A remote authenticated attacker can send a specially crafted request to vulnerable Samba server, trigger buffer overflow and execute arbitrary code on the server with elevated privileges.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code with elevated privileges.
How to mitigate CVE-2016-2126
The vulnerability is fixed in the following versions: 4.5.3, 4.4.8 and 4.3.13.