Public Date:
1290292: CVE-2015-5296 samba: client requesting encryption vulnerable to downgrade attack
A man-in-the-middle vulnerability was found in the way "connection signing" was implemented by Samba. A remote attacker could use this flaw to downgrade an existing Samba client connection and force the use of plain text.

Find out more about CVE-2015-5296 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Gluster 3 Samba on RHEL-7 (samba) RHSA-2016:0016 2016-01-08
Red Hat Gluster 3 Samba on RHEL-6 (samba) RHSA-2016:0015 2016-01-08
Red Hat Enterprise Linux 6 (samba4) RHSA-2016:0010 2016-01-07
Red Hat Enterprise Linux 6 (samba) RHSA-2016:0011 2016-01-07
Red Hat Enterprise Linux 7 (samba) RHSA-2016:0006 2016-01-08

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 samba Not affected
Red Hat Enterprise Linux 5 samba3x Will not fix


Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Stefan Metzmacher of the Samba Team and as the original reporters.

External References

Last Modified