Medium severity6.5NVD Advisory· Published May 11, 2017· Updated May 13, 2026
CVE-2016-2126
CVE-2016-2126
Description
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- rhn.redhat.com/errata/RHSA-2017-0494.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0495.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0662.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0744.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/94994nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037495nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:1265nvdThird Party Advisory
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730nvdThird Party Advisory
- www.samba.org/samba/security/CVE-2016-2126.htmlnvdVendor Advisory
News mentions
0No linked articles in our index yet.