Language:
http://www.nessus.org/u?605dcfa9
https://access.redhat.com/articles/2243351
https://access.redhat.com/articles/2253041
https://access.redhat.com/errata/RHSA-2016:0618
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/security/vulnerabilities/badlock
https://bugzilla.redhat.com/show_bug.cgi?id=1309987
https://bugzilla.redhat.com/show_bug.cgi?id=1311893
https://bugzilla.redhat.com/show_bug.cgi?id=1311902
https://bugzilla.redhat.com/show_bug.cgi?id=1311903
https://bugzilla.redhat.com/show_bug.cgi?id=1311910
https://bugzilla.redhat.com/show_bug.cgi?id=1312082
https://bugzilla.redhat.com/show_bug.cgi?id=1312084
Severity: High
ID: 90495
File Name: redhat-RHSA-2016-0618.nasl
Version: 2.19
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/13/2016
Updated: 3/24/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Vendor Severity: Critical
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2016-2118
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:samba-common, p-cpe:/a:redhat:enterprise_linux:samba-winbind-modules, p-cpe:/a:redhat:enterprise_linux:samba-client, p-cpe:/a:redhat:enterprise_linux:samba-client-libs, p-cpe:/a:redhat:enterprise_linux:ipa, p-cpe:/a:redhat:enterprise_linux:ipa-admintools, p-cpe:/a:redhat:enterprise_linux:samba-vfs-glusterfs, p-cpe:/a:redhat:enterprise_linux:openchange-devel-docs, p-cpe:/a:redhat:enterprise_linux:samba-winbind-clients, p-cpe:/a:redhat:enterprise_linux:samba-libs, p-cpe:/a:redhat:enterprise_linux:pytalloc, p-cpe:/a:redhat:enterprise_linux:python-tevent, p-cpe:/a:redhat:enterprise_linux:samba-test, p-cpe:/a:redhat:enterprise_linux:ipa-server-trust-ad, p-cpe:/a:redhat:enterprise_linux:libtevent, p-cpe:/a:redhat:enterprise_linux:ipa-client, p-cpe:/a:redhat:enterprise_linux:samba-pidl, p-cpe:/a:redhat:enterprise_linux:ipa-python, p-cpe:/a:redhat:enterprise_linux:pyldb-devel, p-cpe:/a:redhat:enterprise_linux:libldb-devel, p-cpe:/a:redhat:enterprise_linux:pyldb, p-cpe:/a:redhat:enterprise_linux:samba-common-libs, p-cpe:/a:redhat:enterprise_linux:samba-dc-libs, p-cpe:/a:redhat:enterprise_linux:ctdb, p-cpe:/a:redhat:enterprise_linux:openchange, cpe:/o:redhat:rhel_eus:7.1, p-cpe:/a:redhat:enterprise_linux:ctdb-devel, p-cpe:/a:redhat:enterprise_linux:samba-test-libs, p-cpe:/a:redhat:enterprise_linux:samba-winbind-krb5-locator, p-cpe:/a:redhat:enterprise_linux:tdb-tools, p-cpe:/a:redhat:enterprise_linux:pytalloc-devel, p-cpe:/a:redhat:enterprise_linux:ipa-server, p-cpe:/a:redhat:enterprise_linux:ldb-tools, p-cpe:/a:redhat:enterprise_linux:libwbclient-devel, p-cpe:/a:redhat:enterprise_linux:openchange-devel, p-cpe:/a:redhat:enterprise_linux:python-tdb, p-cpe:/a:redhat:enterprise_linux:ctdb-tests, p-cpe:/a:redhat:enterprise_linux:libtdb-devel, p-cpe:/a:redhat:enterprise_linux:samba-winbind, p-cpe:/a:redhat:enterprise_linux:libwbclient, p-cpe:/a:redhat:enterprise_linux:samba-devel, p-cpe:/a:redhat:enterprise_linux:libsmbclient, p-cpe:/a:redhat:enterprise_linux:libtdb, p-cpe:/a:redhat:enterprise_linux:samba-dc, p-cpe:/a:redhat:enterprise_linux:libldb, p-cpe:/a:redhat:enterprise_linux:samba-test-devel, p-cpe:/a:redhat:enterprise_linux:libtalloc-devel, p-cpe:/a:redhat:enterprise_linux:samba, p-cpe:/a:redhat:enterprise_linux:libtevent-devel, p-cpe:/a:redhat:enterprise_linux:openchange-client, p-cpe:/a:redhat:enterprise_linux:samba-common-tools, p-cpe:/a:redhat:enterprise_linux:samba-python, p-cpe:/a:redhat:enterprise_linux:libsmbclient-devel, p-cpe:/a:redhat:enterprise_linux:libtalloc
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 4/12/2016
Vulnerability Publication Date: 4/12/2016
CVE: CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118