First published: Fri Dec 09 2016(Updated: )
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.5.3 | 4.5.3 |
redhat/samba | <4.4.8 | 4.4.8 |
redhat/samba | <4.3.13 | 4.3.13 |
Samba | >=4.0.0<4.3.13 | |
Samba | >=4.4.0<4.4.8 | |
Samba | >=4.5.0<4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2126 is classified as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2016-2126, update Samba to version 4.5.3 or later, 4.4.8 or later, or 4.3.13 or later depending on your current version.
CVE-2016-2126 affects Samba versions from 4.0.0 up to 4.5.2 across various distributions.
CVE-2016-2126 enables a remote, authenticated attacker to cause a denial of service by crashing the winbindd process.
CVE-2016-2126 specifically affects the winbindd process due to improper handling of the PAC checksum.