{"id":"CVE-2016-2124","details":"A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.","modified":"2026-04-16T00:05:29.773861165Z","published":"2022-02-18T18:15:08.237Z","related":["ALSA-2021:5082","SUSE-SU-2021:3647-1","SUSE-SU-2021:3649-1","SUSE-SU-2021:3650-1","SUSE-SU-2021:3673-1","SUSE-SU-2021:3674-1","SUSE-SU-2021:3746-1","SUSE-SU-2021:3747-1","SUSE-SU-2022:0361-1","openSUSE-SU-2021:1471-1","openSUSE-SU-2021:3647-1","openSUSE-SU-2021:3650-1","openSUSE-SU-2021:3674-1","openSUSE-SU-2024:11631-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"type":"WEB","url":"https://www.samba.org/samba/security/CVE-2016-2124.html"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-06"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2016-2124.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"9b49519cae3e967af9ea48dc5fcfb6c145e31db4"},{"fixed":"9312b1832e5a808a63fc7f9e7d6e70348cc9eb86"},{"introduced":"c541b9eac581c74fe694f061dc27a9aa0cd4ca43"},{"fixed":"db11778b57610e24324aa4342f89918f66157d71"},{"introduced":"fc8342bd26d1c55ca5780b427f675f31147b27f9"},{"fixed":"7d0c030d4233974c4b9463dad44efdb05e6186f1"}]}],"versions":["ldb-2.3.0","ldb-2.3.1","ldb-2.3.2","ldb-2.4.1","samba-4.14.0","samba-4.14.1","samba-4.14.2","samba-4.14.3","samba-4.14.4","samba-4.14.5","samba-4.14.6","samba-4.14.7","samba-4.14.8","samba-4.14.9","samba-4.15.0","samba-4.15.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2124.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}