aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authortimur <timur@FreeBSD.org>2016-07-13 09:26:46 +0800
committertimur <timur@FreeBSD.org>2016-07-13 09:26:46 +0800
commitd4c68e0ab1963645f5bb50bab503004cc790acb4 (patch)
tree2a62d9d7fa52a541633875b85eedc0c2e2367232 /security
parent6bc22a701a71dd711c9744893dacadad184dc475 (diff)
downloadfreebsd-ports-gnome-d4c68e0ab1963645f5bb50bab503004cc790acb4.tar.gz
freebsd-ports-gnome-d4c68e0ab1963645f5bb50bab503004cc790acb4.tar.zst
freebsd-ports-gnome-d4c68e0ab1963645f5bb50bab503004cc790acb4.zip
Add information about CVE-2016-2119 vulnerability in Samba suits.
Security: CVE-2016-2119
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml43
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ed6881184179..366ed58b5964 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,49 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4729c849-4897-11e6-b704-000c292e4fd8">
+ <topic>samba -- client side SMB2/3 required signing can be downgraded</topic>
+ <affects>
+ <package>
+ <name>samba4</name>
+ <range><ge>4.0.0</ge><le>4.0.26</le></range>
+ </package>
+ <package>
+ <name>samba41</name>
+ <range><ge>4.1.0</ge><le>4.1.23</le></range>
+ </package>
+ <package>
+ <name>samba42</name>
+ <range><ge>4.2.0</ge><lt>4.2.14</lt></range>
+ </package>
+ <package>
+ <name>samba43</name>
+ <range><ge>4.3.0</ge><lt>4.3.11</lt></range>
+ </package>
+ <package>
+ <name>samba44</name>
+ <range><ge>4.4.0</ge><lt>4.4.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Samba team reports:</p>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2016-2119.html">
+ <p>A man in the middle attack can disable client signing over
+ SMB2/3, even if enforced by configuration parameters.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2119</cvename>
+ <url>https://www.samba.org/samba/security/CVE-2016-2119.html</url>
+ </references>
+ <dates>
+ <discovery>2016-07-07</discovery>
+ <entry>2016-07-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="3fcd52b2-4510-11e6-a15f-00248c0c745d">
<topic>ruby-saml -- XML signature wrapping attack</topic>
<affects>