Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-3347

Опубликовано: 20 июл. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 5.9

Описание

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2:4.18.5+dfsg-1ubuntu1
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

2:4.15.13+dfsg-0ubuntu0.20.04.2
esm-infra/xenial

not-affected

focal

not-affected

2:4.15.13+dfsg-0ubuntu0.20.04.2
jammy

not-affected

2:4.15.13+dfsg-0ubuntu1.1
kinetic

not-affected

2:4.16.8+dfsg-0ubuntu1.1
lunar

released

2:4.17.7+dfsg-1ubuntu1.1

Показывать по

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
nvd
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
debian
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...

CVSS3: 5.9
github
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

oracle-oval
около 2 лет назад

ELSA-2023-4328: samba security and bug fix update (MODERATE)

5.9 Medium

CVSS3