{
  "threat_severity" : "Moderate",
  "public_date" : "2021-11-09T00:00:00Z",
  "bugzilla" : {
    "description" : "samba: SMB1 client connections can be downgraded to plaintext authentication",
    "id" : "2019660",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-287",
  "details" : [ "A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.", "A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required." ],
  "acknowledgement" : "Red Hat would like to thank Stefan Metzmacher (SerNet) for reporting this issue. Upstream acknowledges the Samba project as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5192",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "samba-0:4.10.16-17.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-12-13T00:00:00Z",
    "advisory" : "RHSA-2021:5082",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "samba-0:4.14.5-7.el8_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-12-13T00:00:00Z",
    "advisory" : "RHSA-2021:5082",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "samba-0:4.14.5-7.el8_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2022-01-11T00:00:00Z",
    "advisory" : "RHSA-2022:0074",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "samba-0:4.11.2-18.el8_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support",
    "release_date" : "2022-01-04T00:00:00Z",
    "advisory" : "RHSA-2022:0008",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.4",
    "package" : "samba-0:4.13.3-8.el8_4"
  }, {
    "product_name" : "Red Hat Gluster Storage 3.5 for RHEL 7",
    "release_date" : "2021-11-29T00:00:00Z",
    "advisory" : "RHSA-2021:4844",
    "cpe" : "cpe:/a:redhat:storage:3.5:samba:el7",
    "package" : "samba-0:4.11.6-114.el7rhgs"
  }, {
    "product_name" : "Red Hat Gluster Storage 3.5 for RHEL 8",
    "release_date" : "2021-11-29T00:00:00Z",
    "advisory" : "RHSA-2021:4843",
    "cpe" : "cpe:/a:redhat:storage:3.5:samba:el8",
    "package" : "samba-0:4.14.5-204.el8rhgs"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "samba",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "samba4",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "samba",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-2124\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-2124\nhttps://www.samba.org/samba/security/CVE-2016-2124.html" ],
  "name" : "CVE-2016-2124",
  "mitigation" : {
    "value" : "Ensure the following [global] smb.conf parameters are set to their default values as shown below:\n~~~\nclient lanman auth = no\nclient NTLMv2 auth = yes\nclient plaintext auth = no\nclient min protocol = SMB2_02\n~~~\nOr use the '-k' command line option only without the -U option, which will make use of an existing krb5 ccache.",
    "lang" : "en:us"
  },
  "csaw" : false
}