Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0625 - Security Advisory
Issued:
2016-04-14
Updated:
2016-04-14

RHSA-2016:0625 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: samba security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for samba is now available for Red Hat Enterprise Linux 4 Extended
Lifecycle Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

[Updated 14 April 2016]
This advisory previously incorrectly listed the CVE-2016-2112 issue as addressed
by this update. However, this issue did not affect the samba packages on Red Hat
Enterprise Linux 4 Extended Lifecycle Support. The CVE-2016-2115 was also
incorrectly listed as addressed by this update. This issue does affect the samba
packages on Red Hat Enterprise Linux 4 Extended Lifecycle Support. Customers are
advised to use the "client signing = required" configuration option in the
smb.conf file to mitigate CVE-2016-2115. No changes have been made to the
packages.

Description

Samba is an open-source implementation of the Server Message Block (SMB)
protocol and the related Common Internet File System (CIFS) protocol, which
allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

  • A protocol flaw, publicly referred to as Badlock, was found in the Security

Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority
(Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection
that a client initiates against a server could be used by a man-in-the-middle
attacker to impersonate the authenticated user against the SAMR or LSA service
on the server. As a result, the attacker would be able to get read/write access
to the Security Account Manager database, and use this to reveal all passwords
or any other potentially sensitive information in that database. (CVE-2016-2118)

  • Several flaws were found in Samba's implementation of NTLMSSP authentication.

An unauthenticated, man-in-the-middle attacker could use this flaw to clear the
encryption and integrity flags of a connection, causing data to be transmitted
in plain text. The attacker could also force the client or server into sending
data in plain text even if encryption was explicitly requested for that
connection. (CVE-2016-2110)

  • It was discovered that Samba configured as a Domain Controller would establish

a secure communication channel with a machine using a spoofed computer name. A
remote attacker able to observe network traffic could use this flaw to obtain
session-related information about the spoofed machine. (CVE-2016-2111)

Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Stefan Metzmacher (SerNet) as the original reporter of
CVE-2016-2118 and CVE-2016-2110.

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 4 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 4 ia64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 4 i386

Fixes

  • BZ - 1311893 - CVE-2016-2110 samba: Man-in-the-middle attacks possible with NTLMSSP authentication
  • BZ - 1311902 - CVE-2016-2111 samba: Spoofing vulnerability when domain controller is configured
  • BZ - 1317990 - CVE-2016-2118 samba: SAMR and LSA man in the middle attacks

CVEs

  • CVE-2016-2118
  • CVE-2016-2111
  • CVE-2016-2110

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/badlock
  • https://access.redhat.com/articles/2253041
  • http://badlock.org/
  • https://access.redhat.com/articles/2243351
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Life Cycle Support 4

SRPM
samba-3.0.33-3.37.el4.src.rpm SHA-256: 4a4c6d1ffc9a2f828e7c1db20f455d74699e241a6ad9bffb456f0d4deed151ae
x86_64
samba-3.0.33-3.37.el4.x86_64.rpm SHA-256: ad893cef9e86b611de9a048077bd3aadd296a91f8f89368b8bcba7342fb72e79
samba-3.0.33-3.37.el4.x86_64.rpm SHA-256: ad893cef9e86b611de9a048077bd3aadd296a91f8f89368b8bcba7342fb72e79
samba-client-3.0.33-3.37.el4.x86_64.rpm SHA-256: 42aca05174df47e01e7eb2878aefcaf0f215b8e7504ded797a39de7d72e542ab
samba-client-3.0.33-3.37.el4.x86_64.rpm SHA-256: 42aca05174df47e01e7eb2878aefcaf0f215b8e7504ded797a39de7d72e542ab
samba-common-3.0.33-3.37.el4.i386.rpm SHA-256: 6d4c9fbd902b25f434a915b1020461f59420ea1ba4320cf65117119650b6cdb3
samba-common-3.0.33-3.37.el4.i386.rpm SHA-256: 6d4c9fbd902b25f434a915b1020461f59420ea1ba4320cf65117119650b6cdb3
samba-common-3.0.33-3.37.el4.x86_64.rpm SHA-256: 1442be918750ed328c2b1ac87f5d40b236f5d74dca472fd0dd8b6db9dd8b4c70
samba-common-3.0.33-3.37.el4.x86_64.rpm SHA-256: 1442be918750ed328c2b1ac87f5d40b236f5d74dca472fd0dd8b6db9dd8b4c70
samba-swat-3.0.33-3.37.el4.x86_64.rpm SHA-256: c9302ff1179a1d6f1147437f142480c94b49e1099544c8ed8e8eb76baef5a5c2
samba-swat-3.0.33-3.37.el4.x86_64.rpm SHA-256: c9302ff1179a1d6f1147437f142480c94b49e1099544c8ed8e8eb76baef5a5c2
ia64
samba-3.0.33-3.37.el4.ia64.rpm SHA-256: 24255d02e865f8e3e1a8e12764bf1d998901d8ed29661561f05cec99cc61a181
samba-client-3.0.33-3.37.el4.ia64.rpm SHA-256: 88acf1fab764cf53b8c4d2f2ea059796a1dc931cd137f395a0078ebc11aea9ae
samba-common-3.0.33-3.37.el4.i386.rpm SHA-256: 6d4c9fbd902b25f434a915b1020461f59420ea1ba4320cf65117119650b6cdb3
samba-common-3.0.33-3.37.el4.ia64.rpm SHA-256: c2cc955a26467b24499c624d835770f8b92c9ffe2de69dcfbd9df485d7665f8b
samba-swat-3.0.33-3.37.el4.ia64.rpm SHA-256: 5ce766db9008769e3c74f38d743901d695b2e7acdeee4b029e1a86cebc6fa286
i386
samba-common-3.0.33-3.37.el4.i386.rpm SHA-256: 6d4c9fbd902b25f434a915b1020461f59420ea1ba4320cf65117119650b6cdb3
samba-common-3.0.33-3.37.el4.i386.rpm SHA-256: 6d4c9fbd902b25f434a915b1020461f59420ea1ba4320cf65117119650b6cdb3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility