Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-23192

Опубликовано: 02 мар. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.13.14+dfsg-1package
sambanot-affectedbusterpackage
sambanot-affectedstretchpackage

Примечания

  • https://bugzilla.samba.org/show_bug.cgi?id=14875

  • https://www.samba.org/samba/security/CVE-2021-23192.html

EPSS

Процентиль: 17%
0.00054
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 4.8
redhat
больше 3 лет назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
nvd
больше 3 лет назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 7.5
github
больше 3 лет назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

EPSS

Процентиль: 17%
0.00054
Низкий