CVE-2016-2126

Source
https://cve.org/CVERecord?id=CVE-2016-2126
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2126.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-2126
Downstream
Related
Published
2017-05-11T14:29:58.077Z
Modified
2026-03-10T13:57:53.013388Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.0.0"
        },
        {
            "fixed": "4.3.13"
        },
        {
            "introduced": "4.4.0"
        },
        {
            "fixed": "4.4.8"
        },
        {
            "introduced": "4.5.0"
        },
        {
            "fixed": "4.5.3"
        }
    ]
}

Affected versions

samba-4.*
samba-4.4.0
samba-4.4.1
samba-4.4.2
samba-4.4.3
samba-4.4.4
samba-4.4.5
samba-4.4.6
samba-4.4.7
samba-4.5.0
samba-4.5.1
samba-4.5.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2126.json"