Bug 1351955 (CVE-2016-2119) - CVE-2016-2119 samba: Client side SMB2/3 required signing can be downgraded
Summary: CVE-2016-2119 samba: Client side SMB2/3 required signing can be downgraded
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-2119
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1351957 1351959 1351960 1351961 1351986 1353504
Blocks: 1351956
TreeView+ depends on / blocked
 
Reported: 2016-07-01 09:03 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-17 03:38 UTC (History)
9 users (show)

Fixed In Version: samba 4.4.5, samba 4.3.11, samba 4.2.14
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way Samba initiated signed DCE/RPC connections. A man-in-the-middle attacker could use this flaw to downgrade the connection to not use signing and therefore impersonate the server.
Clone Of:
Environment:
Last Closed: 2016-07-27 07:14:14 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1486 0 normal SHIPPED_LIVE Moderate: samba security and bug fix update 2016-07-26 11:09:01 UTC
Red Hat Product Errata RHSA-2016:1487 0 normal SHIPPED_LIVE Moderate: samba4 security update 2016-07-26 10:49:28 UTC
Red Hat Product Errata RHSA-2016:1494 0 normal SHIPPED_LIVE Moderate: samba security update 2016-07-26 15:51:09 UTC

Description Huzaifa S. Sidhpurwala 2016-07-01 09:03:44 UTC
As per upstream advisory:


It's possible for an attacker to downgrade the required signing for an SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags.

This applies to the combination of "client ipc signing" and "client ipc max protocol" in their effective default settings ("mandatory" and "SMB3_11").

The combination of "client signing" and "client max protocol" is also affected, but only if "client signing" is explicitly set (as the effective default is "if_required") and "client max protocol" is explicitly set to SMB2 or higher.

Comment 1 Huzaifa S. Sidhpurwala 2016-07-01 09:03:59 UTC
Acknowledgments:

Name: the Samba project
Upstream: Stefan Metzmacher

Comment 5 Huzaifa S. Sidhpurwala 2016-07-07 10:26:45 UTC
Public via:

https://www.samba.org/samba/security/CVE-2016-2119.html

Comment 6 Huzaifa S. Sidhpurwala 2016-07-07 10:36:34 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 1353504]

Comment 7 Fedora Update System 2016-07-12 15:03:32 UTC
samba-4.4.5-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2016-07-15 10:23:27 UTC
samba-4.3.11-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 11 errata-xmlrpc 2016-07-26 06:49:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:1487 https://rhn.redhat.com/errata/RHSA-2016-1487.html

Comment 12 errata-xmlrpc 2016-07-26 07:09:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1486 https://rhn.redhat.com/errata/RHSA-2016-1486.html

Comment 13 errata-xmlrpc 2016-07-26 11:51:49 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.1 for RHEL 7
  Red Hat Gluster Storage 3.1 for RHEL 6

Via RHSA-2016:1494 https://rhn.redhat.com/errata/RHSA-2016-1494.html


Note You need to log in before you can comment on or make changes to this bug.