Bug 1351955 (CVE-2016-2119)

Summary: CVE-2016-2119 samba: Client side SMB2/3 required signing can be downgraded
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asn, gdeschner, jarrpa, mdshaikh, rcyriac, sardella, sbose, security-response-team, sisharma
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: samba 4.4.5, samba 4.3.11, samba 4.2.14 Doc Type: Bug Fix
Doc Text:
A flaw was found in the way Samba initiated signed DCE/RPC connections. A man-in-the-middle attacker could use this flaw to downgrade the connection to not use signing and therefore impersonate the server.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-07-27 07:14:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1351957, 1351959, 1351960, 1351961, 1351986, 1353504    
Bug Blocks: 1351956    

Description Huzaifa S. Sidhpurwala 2016-07-01 09:03:44 UTC
As per upstream advisory:


It's possible for an attacker to downgrade the required signing for an SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags.

This applies to the combination of "client ipc signing" and "client ipc max protocol" in their effective default settings ("mandatory" and "SMB3_11").

The combination of "client signing" and "client max protocol" is also affected, but only if "client signing" is explicitly set (as the effective default is "if_required") and "client max protocol" is explicitly set to SMB2 or higher.

Comment 1 Huzaifa S. Sidhpurwala 2016-07-01 09:03:59 UTC
Acknowledgments:

Name: the Samba project
Upstream: Stefan Metzmacher

Comment 5 Huzaifa S. Sidhpurwala 2016-07-07 10:26:45 UTC
Public via:

https://www.samba.org/samba/security/CVE-2016-2119.html

Comment 6 Huzaifa S. Sidhpurwala 2016-07-07 10:36:34 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 1353504]

Comment 7 Fedora Update System 2016-07-12 15:03:32 UTC
samba-4.4.5-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2016-07-15 10:23:27 UTC
samba-4.3.11-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 11 errata-xmlrpc 2016-07-26 06:49:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:1487 https://rhn.redhat.com/errata/RHSA-2016-1487.html

Comment 12 errata-xmlrpc 2016-07-26 07:09:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1486 https://rhn.redhat.com/errata/RHSA-2016-1486.html

Comment 13 errata-xmlrpc 2016-07-26 11:51:49 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.1 for RHEL 7
  Red Hat Gluster Storage 3.1 for RHEL 6

Via RHSA-2016:1494 https://rhn.redhat.com/errata/RHSA-2016-1494.html