National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2015-5296 Detail

Description

Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.

Source:  MITRE      Last Modified:  12/29/2015

Quick Info

CVE Dictionary Entry:
CVE-2015-5296
Original release date:
12/29/2015
Last revised:
12/30/2016
Source:
US-CERT/NIST

Impact

CVSS Severity (version 3.0):
CVSS v3 Base Score:
5.4 Medium
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N (legend)
Impact Score:
2.7
Exploitability Score:
2.2
CVSS Version 3 Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None
CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html External Source FEDORA FEDORA-2015-b36076d32e
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html External Source FEDORA FEDORA-2015-0e0879cc8a
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html External Source SUSE SUSE-SU-2015:2304
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html External Source SUSE SUSE-SU-2015:2305
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html External Source SUSE openSUSE-SU-2015:2354
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html External Source SUSE openSUSE-SU-2015:2356
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html External Source SUSE SUSE-SU-2016:0032
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html External Source SUSE SUSE-SU-2016:0164
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html External Source SUSE openSUSE-SU-2016:1064
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html External Source SUSE openSUSE-SU-2016:1106
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html External Source SUSE openSUSE-SU-2016:1107
http://www.debian.org/security/2016/dsa-3433 External Source DEBIAN DSA-3433
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/79732 External Source BID 79732
http://www.securitytracker.com/id/1034493 External Source SECTRACK 1034493
http://www.ubuntu.com/usn/USN-2855-1 External Source UBUNTU USN-2855-1
http://www.ubuntu.com/usn/USN-2855-2 External Source UBUNTU USN-2855-2
https://bugzilla.redhat.com/show_bug.cgi?id=1290292 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1290292
https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1 External Source CONFIRM https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9 External Source CONFIRM https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895 External Source CONFIRM https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993 External Source CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
https://security.gentoo.org/glsa/201612-47 External Source GENTOO GLSA-201612-47
https://www.samba.org/samba/security/CVE-2015-5296.html Vendor Advisory External Source CONFIRM https://www.samba.org/samba/security/CVE-2015-5296.html

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
Showing 100 of 115 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 13 change records found - show changes