Vulnerability Description
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 3.2.0, < 4.1.22 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.hMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing ListThird Party Advisory
- http://www.debian.org/security/2016/dsa-3433Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.hThird Party Advisory
- http://www.securityfocus.com/bid/79732Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-5296?
CVE-2015-5296 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unenc...
How severe is CVE-2015-5296?
CVE-2015-5296 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5296?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Debian Debian Linux, Canonical Ubuntu Linux.