Search for vulnerabilities
Vulnerability details: VCID-5mms-cn4c-aaaa
Vulnerability ID VCID-5mms-cn4c-aaaa
Aliases CVE-2016-2123
Summary A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2123.html
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json
epss 0.01487 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.02021 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.90720 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.90720 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.90720 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.90720 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
epss 0.94136 https://api.first.org/data/v1/epss?cve=CVE-2016-2123
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1392702
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
cvssv2 7.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.5 https://nvd.nist.gov/vuln/detail/CVE-2016-2123
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2016-2123
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2016-2123
archlinux Critical https://security.archlinux.org/AVG-111
generic_textual Medium https://ubuntu.com/security/notices/USN-3158-1
generic_textual High https://www.samba.org/samba/security/CVE-2016-2123.html
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2123
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2123
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2123
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.69229
EPSS Score 0.01487
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.