'The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka “BADLOCK.”'
ClearCenter has not received details about this bug at this time.
This bug affects local Samba processes. To temporarily shut down those processes while implementing the fix, run the following:
service smb stop service nmb stop service winbind stop chkconfig smb off chkconfig nmb off chkconfig winbind off