/** * This is the notes section. CVE documents should ONLY be created by employees of ClearCenter with the authority to make statements on behalf of the company. If you have content that would be useful to the statement, please contact ClearCenter. */
'The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka “BADLOCK.”'
ClearCenter has not received details about this bug at this time.
This bug affects local Samba processes. To temporarily shut down those processes while implementing the fix, run the following:
service smb stop service nmb stop service winbind stop chkconfig smb off chkconfig nmb off chkconfig winbind off