Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
292 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
163.49.22.129 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
507 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
163.49.22.130 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
1210 |
H28-MOJ-Online-Nara-8-Seg-1-20161126-Endo_qrnvlr.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.129.150 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
1428 |
H28-MOJ-Online-Nara-8-Seg-2-20161126-Endo_j3uns1.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.129.34 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
1628 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.129.33 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
1828 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.130.5 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
2057 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.130.6 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
2926 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.132.9 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
3171 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.132.10 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
3899 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.132.11 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
4073 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.133.100 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
4246 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.133.128 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
4437 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.133.130 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
4608 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.133.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
4778 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.133.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
5551 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.100 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
5691 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.129 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
5828 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.150 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
6212 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
6404 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.41 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
7081 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.61 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
7270 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.63 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
8237 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.9 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
8431 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.10 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
8610 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.11 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
8746 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.131 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
9050 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
9206 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.42 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
9863 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.137.62 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
10287 |
H28-MOJ-Online-Nara-17-seg-1-20161126-soga_nryyhs.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.138.37 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
10594 |
H28-MOJ-Online-Nara-17-seg-2-20161126-soga_ng4omz.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.138.38 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
10793 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.139.151 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
11127 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.139.33 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
11260 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.139.5 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
11474 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.139.34 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
11602 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.139.6 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
13705 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
192.168.1.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
13878 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
192.168.1.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
23627 |
H28-MOJ-Online-Funa-1-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
163.49.22.130 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
23818 |
H28-MOJ-Online-Funa-1-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
163.49.22.129 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
24386 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.1.150 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
24641 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.1.33 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
24823 |
H28-MOJ-Online-Funa-4-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.1.34 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
25029 |
H28-MOJ-Online-Funa-5-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.2.5 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
25198 |
H28-MOJ-Online-Funa-5-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.2.6 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
25533 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.4.12 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
25753 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.4.13 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
26625 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.4.9 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
26845 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.4.10 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
27065 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.4.11 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
27856 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.100 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28001 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.132 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28147 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28304 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.128 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28451 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.130 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28598 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
28742 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.5.27 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
29555 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.100 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
29669 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.129 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
29784 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
29916 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.41 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
30493 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.61 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
30656 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.63 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
31522 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.9 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
31675 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.10 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
31829 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.11 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
31940 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.131 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
32083 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.150 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
32200 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
32331 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.42 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
32882 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.62 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
33037 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.12 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
33191 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.13 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
33300 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.133 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
33412 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.9.27 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
34463 |
H28-MOJ-Online-Funa-13-04-161103_ccslag.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.10.38 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
34643 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.11.151 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
34953 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.11.33 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
35092 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.11.5 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
35255 |
H28-MOJ-Online-Funa-14-02-161103_12gtxl.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.11.34 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
35353 |
H28-MOJ-Online-Funa-14-02-161103_12gtxl.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
172.27.11.6 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
37419 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
192.168.1.25 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
37566 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
192.168.1.26 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|
37713 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18415 |
90509 |
CVE-2016-2118 |
6.8 |
Medium |
192.168.1.27 |
tcp |
445 |
Samba Badlock Vulnerability |
An SMB server running on the remote host is affected by the Badlock
vulnerability. |
The version of Samba, a CIFS/SMB server for Linux and Unix, running on
the remote host is affected by a flaw, known as Badlock, that exists
in the Security Account Manager (SAM) and Local Security
Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC)
channels. A man-in-the-middle attacker who is able to able to
intercept the traffic between a client and a server hosting a SAM
database can exploit this flaw to force a downgrade of the
authentication level, which allows the execution of arbitrary Samba
network calls in the context of the intercepted user, such as viewing
or modifying sensitive security data in the Active Directory (AD)
database or disabling critical services. |
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later. |
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html |
Nessus detected that the Samba Badlock patch has not been applied. |
|