vulnerability
CentOS Linux: CVE-2021-23192: Important: samba security update (CESA-2021:5082)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Dec 13, 2021 | Dec 14, 2021 | Jun 12, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Dec 13, 2021
Added
Dec 14, 2021
Modified
Jun 12, 2023
Description
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Solutions
centos-upgrade-ctdbcentos-upgrade-ctdb-debuginfocentos-upgrade-libsmbclientcentos-upgrade-libsmbclient-debuginfocentos-upgrade-libwbclientcentos-upgrade-libwbclient-debuginfocentos-upgrade-python3-sambacentos-upgrade-python3-samba-debuginfocentos-upgrade-python3-samba-testcentos-upgrade-sambacentos-upgrade-samba-clientcentos-upgrade-samba-client-debuginfocentos-upgrade-samba-client-libscentos-upgrade-samba-client-libs-debuginfocentos-upgrade-samba-commoncentos-upgrade-samba-common-libscentos-upgrade-samba-common-libs-debuginfocentos-upgrade-samba-common-toolscentos-upgrade-samba-common-tools-debuginfocentos-upgrade-samba-debuginfocentos-upgrade-samba-debugsourcecentos-upgrade-samba-krb5-printingcentos-upgrade-samba-krb5-printing-debuginfocentos-upgrade-samba-libscentos-upgrade-samba-libs-debuginfocentos-upgrade-samba-pidlcentos-upgrade-samba-testcentos-upgrade-samba-test-debuginfocentos-upgrade-samba-test-libscentos-upgrade-samba-test-libs-debuginfocentos-upgrade-samba-vfs-iouringcentos-upgrade-samba-vfs-iouring-debuginfocentos-upgrade-samba-winbindcentos-upgrade-samba-winbind-clientscentos-upgrade-samba-winbind-clients-debuginfocentos-upgrade-samba-winbind-debuginfocentos-upgrade-samba-winbind-krb5-locatorcentos-upgrade-samba-winbind-krb5-locator-debuginfocentos-upgrade-samba-winbind-modulescentos-upgrade-samba-winbind-modules-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.