First published: Fri Dec 09 2016(Updated: )
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.5.3 | 4.5.3 |
redhat/samba | <4.4.8 | 4.4.8 |
redhat/samba | <4.3.13 | 4.3.13 |
Samba Samba | >=4.0.0<4.3.13 | |
Samba Samba | >=4.4.0<4.4.8 | |
Samba Samba | >=4.5.0<4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.