First published: Thu Dec 10 2015(Updated: )
As per samba upstream advisory: Samba, operating as an AD DC, is sometimes operated in a domain with a mix of Samba and Windows Active Directory Domain Controllers. All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as an AD DC in the same domain with Windows DCs, could be used to override the protection against the MS15-096 / <a href="https://access.redhat.com/security/cve/CVE-2015-2535">CVE-2015-2535</a> security issue in Windows. Prior to MS16-096 it was possible to bypass the quota of machine accounts a non-administrative user could create. Pure Samba domains are not impacted, as Samba does not implement the SeMachineAccountPrivilege functionality to allow non-administrator users to create new computer objects. The following mitigation was suggested by upstream: Only users with SeMachineAccountPrivilege can exploit this issue in Windows, removing this privilege from "Authenticated Users" can provide a mitigation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.0.0<4.1.22 | |
Samba | >=4.2.0<4.2.7 | |
Samba | >=4.3.0<4.3.3 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8467 is classified as a medium severity vulnerability.
To fix CVE-2015-8467, upgrade Samba to a version higher than 4.3.3.
All versions of Samba from 4.0.0 to 4.3.2 are affected by CVE-2015-8467.
Samba deployed as an Active Directory Domain Controller in mixed environments with Windows Domain Controllers are vulnerable to CVE-2015-8467.
Yes, CVE-2015-8467 specifically affects Samba acting as an Active Directory Domain Controller.