Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m82c-5hpw-48f7

Опубликовано: 20 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

EPSS

Процентиль: 61%
0.00419
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-347
CWE-924

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
redhat
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
nvd
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
debian
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...

oracle-oval
около 2 лет назад

ELSA-2023-4328: samba security and bug fix update (MODERATE)

EPSS

Процентиль: 61%
0.00419
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-347
CWE-924