First published: Thu Dec 10 2015(Updated: )
As per samba upstream advisory: Samba, operating as an AD DC, is sometimes operated in a domain with a mix of Samba and Windows Active Directory Domain Controllers. All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as an AD DC in the same domain with Windows DCs, could be used to override the protection against the MS15-096 / <a href="https://access.redhat.com/security/cve/CVE-2015-2535">CVE-2015-2535</a> security issue in Windows. Prior to MS16-096 it was possible to bypass the quota of machine accounts a non-administrative user could create. Pure Samba domains are not impacted, as Samba does not implement the SeMachineAccountPrivilege functionality to allow non-administrator users to create new computer objects. The following mitigation was suggested by upstream: Only users with SeMachineAccountPrivilege can exploit this issue in Windows, removing this privilege from "Authenticated Users" can provide a mitigation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.0.0<4.1.22 | |
Samba Samba | >=4.2.0<4.2.7 | |
Samba Samba | >=4.3.0<4.3.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Canonical Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.