Описание
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | samba | Not affected | ||
Red Hat Enterprise Linux 5 | samba | Not affected | ||
Red Hat Enterprise Linux 5 | samba3x | Not affected | ||
Red Hat Enterprise Linux 6 | samba | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 5.6 | samba | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 5.6 | samba3x | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 5.9 | samba | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 5.9 | samba3x | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 6.2 | samba | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 6.4 | samba | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x bef ...
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
Уязвимость реализации протокола SMB1 пакета программ сетевого взаимодействия Samba, связанная с недостатками элементов безопасности, позволяющая нарушителю оказать воздействие на целостность данных
EPSS
5.8 Medium
CVSS2