CVE-2016-2126

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-2126
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2126.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-2126
Downstream
Related
Published
2017-05-11T14:29:58Z
Modified
2025-10-14T14:34:08Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events