Badlock
{{Short description|Security bug}}
{{infobox bug
| name=Badlock
| image=Badlock logo.svg
| caption=Logo representing Badlock.
| CVE=[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118 CVE-2016-2118]
| website=https://web.archive.org/web/20170608065927/http://badlock.org/
}}
Badlock ({{CVE|2016-2118}}) is a security bug disclosed on April 12, 2016 affecting the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) remote protocols{{cite web
| title=Microsoft Security Bulletin MS16-047
| url=https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-047
| publisher=Microsoft TechNet
| date=2016-04-12
| access-date=2018-02-21}} supported by Windows and Samba servers.{{cite web
| title=Badlock Bug
| url=http://badlock.org/
| archive-url=https://web.archive.org/web/20170608065927/http://badlock.org/
| archive-date=2017-06-08
| url-status=dead
| access-date=2018-02-21}}
Both SAM and LSAD are layered onto the DCE 1.1 Remote Procedure Call (DCE/RPC) protocol. As implemented in Samba and Windows, the RPC services allowed an attacker to become man in the middle.{{cite web
| title=CVE-2016-2118
| url=https://www.samba.org/samba/security/CVE-2016-2118.html
| access-date=2018-02-21}} Although the vulnerability was discovered during the development of Samba, the namegiving SMB protocol itself is not affected.
References
{{Reflist}}
External links
- {{Webarchive|url=https://web.archive.org/web/20170608065927/http://badlock.org/|title=Badlock Bug}}
{{Hacking in the 2010s}}