1
PublicDateAtUSN: 2016-12-19
2
Candidate: CVE-2016-2126
6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
7
https://www.samba.org/samba/security/CVE-2016-2126.html
8
https://usn.ubuntu.com/usn/usn-3158-1
10
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to
11
incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A
12
remote, authenticated, attacker can cause the winbindd process to crash
13
using a legitimate Kerberos ticket. A local service with access to the
14
winbindd privileged pipe can cause winbindd to cache elevated access
17
Volker Lendecke discovered that Kerberos PAC validation implementation
18
in Samba contained multiple vulnerabilities. An authenticated attacker
19
could use this to cause a denial of service or gain administrative
24
https://bugzilla.samba.org/show_bug.cgi?id=12446
26
Discovered-by: Volker Lendecke
30
upstream_samba: needs-triage
31
precise_samba: not-affected
32
precise/esm_samba: not-affected
33
trusty_samba: released (2:4.3.11+dfsg-0ubuntu0.14.04.4)
34
vivid/ubuntu-core_samba: DNE
35
vivid/stable-phone-overlay_samba: DNE
36
xenial_samba: released (2:4.3.11+dfsg-0ubuntu0.16.04.3)
37
yakkety_samba: released (2:4.4.5+dfsg-2ubuntu5.2)
38
zesty_samba: released (2:4.4.5+dfsg-2ubuntu7)
39
devel_samba: released (2:4.4.5+dfsg-2ubuntu7)
42
upstream_samba4: needs-triage
43
precise_samba4: ignored (reached end-of-life)
44
precise/esm_samba4: DNE (precise was needed)
46
vivid/ubuntu-core_samba4: DNE
47
vivid/stable-phone-overlay_samba4: DNE