CVE-2015-5296

Loading...

General

Score:4.3/10.0
Severity:Low
Category:Input Validation Error
Exploit:Available

Impact Metrics

Confidentiality:None
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Relative vulnerabilities

CVE-2007-2444, CVE-2007-2446, CVE-2007-2447, CVE-2008-1105, CVE-2008-3789, CVE-2008-4314, CVE-2009-2813, CVE-2009-2906, CVE-2009-2948, CVE-2009-3297, CVE-2010-0728, CVE-2010-3069, CVE-2011-0719, CVE-2011-2522, CVE-2011-2694, CVE-2012-0817, CVE-2012-1182, CVE-2012-2111, CVE-2012-6150, CVE-2013-0172, CVE-2013-0213, CVE-2013-0214, CVE-2013-4124, CVE-2013-4408, CVE-2013-4475, CVE-2013-4496, CVE-2013-6442, CVE-2014-0178, CVE-2014-0244, CVE-2014-3493, CVE-2014-3560, CVE-2015-0240, CVE-2015-2535, CVE-2015-3223, CVE-2015-5252, CVE-2015-5299, CVE-2015-5330, CVE-2015-5370, CVE-2015-7540, CVE-2015-7560, CVE-2015-8467, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118, CVE-2016-2119, CVE-2016-2125, CVE-2016-2126, CVE-2017-12150, CVE-2017-12151, CVE-2017-12163, CVE-2017-14746, CVE-2017-15275, CVE-2017-2619, CVE-2017-7494, CVE-2018-1050, CVE-2018-10858, CVE-2018-1139

Published on 29/12/15 - Updated on 30/10/18

Description

Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.

Category: Input Validation Error

CWE-20 (Input Validation)
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Security Notices

US National Vulnerability DatabaseCVE-2015-5296
Amazon Linux ALAS-2016-634
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2015-AVI-545
CentOS CESA-2016:0006, CESA-2016:0010, CESA-2016:0011
Debian DSA-3433-1
Debian LTSDLA-379-1
Oracle Linux ELSA-2016-0006, ELSA-2016-0010, ELSA-2016-0011, ELSA-2017-0662, ELSA-2018-1860, ELSA-2018-3056
Redhat RHSA-2016:0006, RHSA-2016:0010, RHSA-2016:0011, RHSA-2016:0015, RHSA-2016:0016
Renater 2015/VULN292, 2017/VULN263
SUSE SUSE-SU-2015:2304, SUSE-SU-2015:2305, SUSE-SU-2016:0032, SUSE-SU-2016:0164
Ubuntu USN-2855-1, USN-2855-2

Exploits

SecurityFocusBID-79732

Relative technologies

VendorProduct
sambasamba

Share this vulnerability with:

Twitter Facebook LinkedIn Mail