Topics Map > University of Chicago > IT Services > Accounts, Identity, & Security > Security

Badlock Samba Vulnerability Remediation

This article explains the Badlock Samba vulnerability as a critical vulnerability in recent versions of the Samba protocol. Versions 4.2 and newer are all affected, and patches for all relevant versions will be released on April 12th, 2016.

A critical vulnerability affecting Samba was disclosed on April 12th, 2016 (4/12/2016). This vulnerability affects any server that uses Samba 4.4, Samba 4.3, Samba 4.2 and many earlier, unsupported, unpatched versions of Samba.

The result of this vulnerability is that older versions of Samba and certain Windows SMB shares can be exploited in one of two ways:

  1. A man-in-the-middle attack is possible against older implementations of Samba/SMB. A malicious snooper could intercept administrative (such as an Active Directory administrator) traffic, thus gaining access to sensitive information such as passwords, account details, or other vulnerable destinations.
  2. A malicious third party that can communicate with a Samba/SMB server could cause a denial of service (DoS) attack.


All administrators should assess the versions of Samba used on any servers they support and prepare to upgrade as soon as they are released (where technically feasible).

Recommended patches vary by the version of Samba used, as below:

  • 4.2.10 / 4.2.11
  • 4.3.7 / 4.3.8
  • 4.4.1 / 4.4.2

Windows administrators should apply all available patches as soon as technically possible to their servers.

See for more information.

More Information

More details about this vulnerability can be found at

This vulnerability is primarily focused around one specific CVE:

However, a number of other CVEs are related to this vulnerability:

Keywords:security windows cve bug   Doc ID:62557
Owner:Jason E.Group:University of Chicago
Created:2016-04-06 16:10 CSTUpdated:2016-04-12 14:40 CST
Sites:University of Chicago, University of Chicago - Sandbox
Feedback:  0   0