First published: Wed Nov 03 2021(Updated: )
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <0:4.10.16-17.el7_9 | 0:4.10.16-17.el7_9 |
redhat/samba | <0:4.14.5-7.el8_5 | 0:4.14.5-7.el8_5 |
redhat/samba | <0:4.11.2-18.el8_2 | 0:4.11.2-18.el8_2 |
redhat/samba | <0:4.13.3-8.el8_4 | 0:4.13.3-8.el8_4 |
redhat/samba | <0:4.11.6-114.el7 | 0:4.11.6-114.el7 |
redhat/samba | <0:4.14.5-204.el8 | 0:4.14.5-204.el8 |
redhat/samba | <4.15.2 | 4.15.2 |
redhat/samba | <4.14.10 | 4.14.10 |
redhat/samba | <4.13.14 | 4.13.14 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.1+dfsg-2 | |
Samba | >=3.0.0<4.13.14 | |
Samba | >=4.14.0<4.14.10 | |
Samba | >=4.15.0<4.15.2 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 | |
Red Hat Fedora | =35 | |
Red Hat CodeReady Linux Builder | ||
Red Hat Gluster Storage | =3.0 | |
Red Hat Gluster Storage | =3.5 | |
Red Hat OpenStack for IBM Power | =13 | |
Red Hat OpenStack for IBM Power | =16.1 | |
Red Hat OpenStack for IBM Power | =16.2 | |
Red Hat Virtualization Host EUS | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems | =7.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for Power, big endian | =7.0 | |
Red Hat Enterprise Linux for Power, little endian | =7.0 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Resilient Storage | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.2 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.4 | |
Red Hat Enterprise Linux | =8.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =21.04 | |
Ubuntu | =21.10 |
Ensure the following [global] smb.conf parameters are set to their default values as shown below: ~~~ client lanman auth = no client NTLMv2 auth = yes client plaintext auth = no client min protocol = SMB2_02 ~~~ Or use the '-k' command line option only without the -U option, which will make use of an existing krb5 ccache.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2124 is classified as a medium severity vulnerability.
To fix CVE-2016-2124, upgrade Samba to the latest version that is not affected, specifically versions 4.10.16-17.el7_9, 4.14.5-7.el8_5, or later.
CVE-2016-2124 affects multiple versions of the Samba software across Red Hat Enterprise Linux, Debian, and Ubuntu environments.
An attacker can exploit CVE-2016-2124 by downgrading an SMB1 client connection to retrieve plaintext passwords.
Disabling SMB1 on affected systems can serve as a temporary workaround for CVE-2016-2124 until a complete upgrade is applied.