Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cnvd-2016-02262
Vulnerability from cnvd
Title
Samba中间人攻击漏洞(CNVD-2016-02262)
Description
Samba是一套可使UNIX系列的操作系统与微软Windows操作系统的SMB/CIFS网络协议做连结的自由软件。
Samba未能验证SSL/TLS证书,允许远程攻击者可利用该漏洞通过中间人攻击,欺骗服务器。
Severity
中
        VLAI Severity ?
      
      Patch Name
Samba中间人攻击漏洞(CNVD-2016-02262)的补丁
Patch Description
Samba是一套可使UNIX系列的操作系统与微软Windows操作系统的SMB/CIFS网络协议做连结的自由软件。
Samba未能验证SSL/TLS证书,允许远程攻击者可利用该漏洞通过中间人攻击,欺骗服务器。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://www.samba.org/samba/history/samba-4.2.10.html
Reference
https://www.samba.org/samba/history/samba-4.2.10.html
Impacted products
          | Name | Samba Samba | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-2113"
    }
  },
  "description": "Samba\u662f\u4e00\u5957\u53ef\u4f7fUNIX\u7cfb\u5217\u7684\u64cd\u4f5c\u7cfb\u7edf\u4e0e\u5fae\u8f6fWindows\u64cd\u4f5c\u7cfb\u7edf\u7684SMB/CIFS\u7f51\u7edc\u534f\u8bae\u505a\u8fde\u7ed3\u7684\u81ea\u7531\u8f6f\u4ef6\u3002\r\n\r\nSamba\u672a\u80fd\u9a8c\u8bc1SSL/TLS\u8bc1\u4e66\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u6b3a\u9a97\u670d\u52a1\u5668\u3002",
  "discovererName": "Samba",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.samba.org/samba/history/samba-4.2.10.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-02262",
  "openTime": "2016-04-18",
  "patchDescription": "Samba\u662f\u4e00\u5957\u53ef\u4f7fUNIX\u7cfb\u5217\u7684\u64cd\u4f5c\u7cfb\u7edf\u4e0e\u5fae\u8f6fWindows\u64cd\u4f5c\u7cfb\u7edf\u7684SMB/CIFS\u7f51\u7edc\u534f\u8bae\u505a\u8fde\u7ed3\u7684\u81ea\u7531\u8f6f\u4ef6\u3002\r\n\r\nSamba\u672a\u80fd\u9a8c\u8bc1SSL/TLS\u8bc1\u4e66\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u6b3a\u9a97\u670d\u52a1\u5668\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Samba\u4e2d\u95f4\u4eba\u653b\u51fb\u6f0f\u6d1e\uff08CNVD-2016-02262\uff09\u7684\u8865\u4e01",
  "products": {
    "product": "Samba Samba"
  },
  "referenceLink": "https://www.samba.org/samba/history/samba-4.2.10.html",
  "serverity": "\u4e2d",
  "submitTime": "2016-04-14",
  "title": "Samba\u4e2d\u95f4\u4eba\u653b\u51fb\u6f0f\u6d1e\uff08CNVD-2016-02262\uff09"
}
  CVE-2016-2113 (GCVE-0-2016-2113)
Vulnerability from cvelistv5
Published
2016-04-25 00:00
      Modified
2024-08-05 23:17
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - n/a
 
Summary
Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
            
          
        References
          {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:17:50.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSA:2016-106-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
          },
          {
            "name": "SUSE-SU-2016:1022",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
          },
          {
            "name": "RHSA-2016:0612",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
          },
          {
            "name": "USN-2950-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2950-1"
          },
          {
            "name": "SUSE-SU-2016:1028",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://badlock.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
          },
          {
            "name": "openSUSE-SU-2016:1064",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
          },
          {
            "name": "USN-2950-5",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2950-5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
          },
          {
            "name": "FEDORA-2016-be53260726",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
          },
          {
            "name": "RHSA-2016:0618",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
          },
          {
            "name": "SUSE-SU-2016:1024",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
          },
          {
            "name": "SUSE-SU-2016:1023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
          },
          {
            "name": "1035533",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035533"
          },
          {
            "name": "FEDORA-2016-48b3761baa",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
          },
          {
            "name": "RHSA-2016:0614",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
          },
          {
            "name": "openSUSE-SU-2016:1025",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
          },
          {
            "name": "RHSA-2016:0620",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
          },
          {
            "name": "openSUSE-SU-2016:1106",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa122"
          },
          {
            "name": "USN-2950-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2950-3"
          },
          {
            "name": "FEDORA-2016-383fce04e2",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
          },
          {
            "name": "openSUSE-SU-2016:1107",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
          },
          {
            "name": "GLSA-201612-47",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201612-47"
          },
          {
            "name": "DSA-3548",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3548"
          },
          {
            "name": "USN-2950-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2950-2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.samba.org/samba/security/CVE-2016-2113.html"
          },
          {
            "name": "USN-2950-4",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2950-4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T21:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SSA:2016-106-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
        },
        {
          "name": "SUSE-SU-2016:1022",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
        },
        {
          "name": "RHSA-2016:0612",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
        },
        {
          "name": "USN-2950-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2950-1"
        },
        {
          "name": "SUSE-SU-2016:1028",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://badlock.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
        },
        {
          "name": "openSUSE-SU-2016:1064",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
        },
        {
          "name": "USN-2950-5",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2950-5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
        },
        {
          "name": "FEDORA-2016-be53260726",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
        },
        {
          "name": "RHSA-2016:0618",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
        },
        {
          "name": "SUSE-SU-2016:1024",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
        },
        {
          "name": "SUSE-SU-2016:1023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
        },
        {
          "name": "1035533",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035533"
        },
        {
          "name": "FEDORA-2016-48b3761baa",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
        },
        {
          "name": "RHSA-2016:0614",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
        },
        {
          "name": "openSUSE-SU-2016:1025",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
        },
        {
          "name": "RHSA-2016:0620",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
        },
        {
          "name": "openSUSE-SU-2016:1106",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bto.bluecoat.com/security-advisory/sa122"
        },
        {
          "name": "USN-2950-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2950-3"
        },
        {
          "name": "FEDORA-2016-383fce04e2",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
        },
        {
          "name": "openSUSE-SU-2016:1107",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
        },
        {
          "name": "GLSA-201612-47",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201612-47"
        },
        {
          "name": "DSA-3548",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3548"
        },
        {
          "name": "USN-2950-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2950-2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.samba.org/samba/security/CVE-2016-2113.html"
        },
        {
          "name": "USN-2950-4",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2950-4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-2113",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSA:2016-106-02",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
            },
            {
              "name": "SUSE-SU-2016:1022",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
            },
            {
              "name": "RHSA-2016:0612",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
            },
            {
              "name": "USN-2950-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2950-1"
            },
            {
              "name": "SUSE-SU-2016:1028",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
            },
            {
              "name": "http://badlock.org/",
              "refsource": "MISC",
              "url": "http://badlock.org/"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
            },
            {
              "name": "openSUSE-SU-2016:1064",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
            },
            {
              "name": "USN-2950-5",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2950-5"
            },
            {
              "name": "https://www.samba.org/samba/history/samba-4.2.10.html",
              "refsource": "CONFIRM",
              "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
            },
            {
              "name": "FEDORA-2016-be53260726",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
            },
            {
              "name": "RHSA-2016:0618",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
            },
            {
              "name": "SUSE-SU-2016:1024",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
            },
            {
              "name": "SUSE-SU-2016:1023",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
            },
            {
              "name": "https://www.samba.org/samba/latest_news.html#4.4.2",
              "refsource": "CONFIRM",
              "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
            },
            {
              "name": "1035533",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035533"
            },
            {
              "name": "FEDORA-2016-48b3761baa",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
            },
            {
              "name": "RHSA-2016:0614",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
            },
            {
              "name": "openSUSE-SU-2016:1025",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
            },
            {
              "name": "RHSA-2016:0620",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
            },
            {
              "name": "openSUSE-SU-2016:1106",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
            },
            {
              "name": "https://bto.bluecoat.com/security-advisory/sa122",
              "refsource": "CONFIRM",
              "url": "https://bto.bluecoat.com/security-advisory/sa122"
            },
            {
              "name": "USN-2950-3",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2950-3"
            },
            {
              "name": "FEDORA-2016-383fce04e2",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
            },
            {
              "name": "openSUSE-SU-2016:1107",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
            },
            {
              "name": "GLSA-201612-47",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201612-47"
            },
            {
              "name": "DSA-3548",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3548"
            },
            {
              "name": "USN-2950-2",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2950-2"
            },
            {
              "name": "https://www.samba.org/samba/security/CVE-2016-2113.html",
              "refsource": "CONFIRM",
              "url": "https://www.samba.org/samba/security/CVE-2016-2113.html"
            },
            {
              "name": "USN-2950-4",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2950-4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-2113",
    "datePublished": "2016-04-25T00:00:00",
    "dateReserved": "2016-01-29T00:00:00",
    "dateUpdated": "2024-08-05T23:17:50.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
 
Loading…
      Loading…