First published: Fri Mar 14 2014(Updated: )
Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=3.4.0<3.6.23 | |
Samba | >=4.0.0<4.0.16 | |
Samba | >=4.1.0<4.1.6 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4496 is considered a moderate severity vulnerability as it allows attackers to exploit weak password policies through brute-force attacks.
To fix CVE-2013-4496, upgrade Samba to versions 3.6.23, 4.0.16, or 4.1.6 or higher to ensure password-guessing protection mechanisms are properly enforced.
CVE-2013-4496 affects Samba versions prior to 3.6.23, 4.0.x prior to 4.0.16, and 4.1.x prior to 4.1.6.
CVE-2013-4496 increases the risk of unauthorized access, as it allows attackers to perform brute-force password attacks on affected systems.
Yes, if you are running an affected version of Samba on Ubuntu 10.04, 12.04, 12.10, or 13.10, your system is vulnerable to CVE-2013-4496.