Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 579802 - <net-fs/samba-{4.2.11,4.3.8,4.4.2}: man-in-the-middle attack (CVE-2015-5370, CVE-2016-{2110,2111,2112,2113,2114,2115,2118})
Summary: <net-fs/samba-{4.2.11,4.3.8,4.4.2}: man-in-the-middle attack (CVE-2015-5370, ...
Status: RESOLVED DUPLICATE of bug 578004
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.samba.org/samba/security/...
Whiteboard: A3 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-04-13 05:26 UTC by Sergey Popov
Modified: 2016-04-13 05:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sergey Popov gentoo-dev 2016-04-13 05:26:25 UTC
This vulnerability is also known as "Badlock bug" - http://badlock.org/

From $URL:

The Security Account Manager Remote Protocol [MS-SAMR] and the
Local Security Authority (Domain Policy) Remote Protocol [MS-LSAD]
are both vulnerable to man in the middle attacks. Both are application level
protocols based on the generic DCE 1.1 Remote Procedure Call (DCERPC) protocol.

These protocols are typically available on all Windows installations
as well as every Samba server. They are used to maintain
the Security Account Manager Database. This applies to all
roles, e.g. standalone, domain member, domain controller.

Any authenticated DCERPC connection a client initiates against a server
can be used by a man in the middle to impersonate the authenticated user
against the SAMR or LSAD service on the server.

The client chosen application protocol, auth type (e.g. Kerberos or NTLMSSP)
and auth level (NONE, CONNECT, PKT_INTEGRITY, PKT_PRIVACY) do not matter
in this case. A man in the middle can change auth level to CONNECT
(which means authentication without message protection) and take over
the connection.

As a result, a man in the middle is able to get read/write access to the
Security Account Manager Database, which reveals all passwords
and any other potential sensitive information.

Samba running as an active directory domain controller is additionally
missing checks to enforce PKT_PRIVACY for the
Directory Replication Service Remote Protocol [MS-DRSR] (drsuapi)
and the BackupKey Remote Protocol [MS-BKRP] (backupkey).
The Domain Name Service Server Management Protocol [MS-DNSP] (dnsserver)
is not enforcing at least PKT_INTEGRITY.
Comment 1 Sergey Popov gentoo-dev 2016-04-13 05:29:17 UTC

*** This bug has been marked as a duplicate of bug 578004 ***