First published: Mon Jun 11 2018(Updated: )
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.7.0<4.7.9 | |
Samba Samba | >=4.8.0<4.8.4 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/samba | <4.7.9 | 4.7.9 |
redhat/samba | <4.8.4 | 4.8.4 |
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.2 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.2 |
ubuntu/samba | <4.7.9<4.8.4 | 4.7.9 4.8.4 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1139 is a vulnerability in Samba that allows the use of weak NTLMv1 authentication.
CVE-2018-1139 has a severity rating of 8.1 (high).
CVE-2018-1139 affects Samba versions before 4.7.9 and 4.8.4.
A man-in-the-middle attacker can exploit CVE-2018-1139 to read the credential and other details passed between the Samba server and client.
You can find more information about CVE-2018-1139 on the Samba website, the RedHat Bugzilla page, and the RedHat errata page.