CVE 2016-2126
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Related bugs and status
CVE-2016-2126 (Candidate) is related to these bugs:
Bug #1584485: Upgrading samba to latest security fixes together with winbind in nsswitch.conf can harm entire OS
Bug #1635491: nmbd hangs on service start if only the loopback interface is configured
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1635491 | nmbd hangs on service start if only the loopback interface is configured | samba (Ubuntu) | High | Fix Released | ||
1635491 | nmbd hangs on service start if only the loopback interface is configured | samba (Debian) | Unknown | Fix Released |
Bug #1639962: smbd crashed on startup with newest libtevent
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1639962 | smbd crashed on startup with newest libtevent | samba (Ubuntu) | Critical | Fix Released | ||
1639962 | smbd crashed on startup with newest libtevent | samba | Unknown | Unknown |
Bug #1659707: Please merge with Debian unstable 2:4.5.4+dfsg-1
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1659707 | Please merge with Debian unstable 2:4.5.4+dfsg-1 | samba (Ubuntu) | High | Fix Released |
See the
CVE page on Mitre.org
for more details.