CVE-2016-2110 (NVD)

2016-04-24

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.

Products Ubuntu_linux, Samba
Type 7PK - Security Features (CWE-254)
First patch - None (likely due to unavailable code)
Links http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
http://rhn.redhat.com/errata/RHSA-2016-0620.html
http://rhn.redhat.com/errata/RHSA-2016-0621.html
https://security.gentoo.org/glsa/201612-47
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html