CVE-2016-2126

Source
https://cve.org/CVERecord?id=CVE-2016-2126
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2126.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-2126
Downstream
Related
Published
2017-05-11T14:29:58.077Z
Modified
2026-02-11T07:13:20.608238Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.

References

Affected packages

Git / github.com/samba-team/samba

Affected versions

samba-4.*
samba-4.4.0
samba-4.4.1
samba-4.4.2
samba-4.4.3
samba-4.4.4
samba-4.4.5
samba-4.4.6
samba-4.4.7
samba-4.5.0
samba-4.5.1
samba-4.5.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2126.json"