Логотип exploitDog
bind:"BDU:2022-05707" OR bind:"CVE-2021-23192"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-05707" OR bind:"CVE-2021-23192"

Количество 15

Количество 15

fstec логотип

BDU:2022-05707

больше 4 лет назад

Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2021-23192

почти 4 года назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-23192

около 4 лет назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2021-23192

почти 4 года назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-23192

больше 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-23192

почти 4 года назад

A flaw was found in the way samba implemented DCE/RPC. If a client to ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-vffc-r23p-p6rq

почти 4 года назад

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3650-1

около 4 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1471-1

около 4 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3650-1

около 4 лет назад

Security update for samba

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3649-1

около 4 лет назад

Security update for samba

EPSS: Низкий
rocky логотип

RLSA-2021:5082

около 4 лет назад

Important: samba security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-5082

около 4 лет назад

ELSA-2021-5082: samba security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3647-1

около 4 лет назад

Security update for samba and ldb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3647-1

около 4 лет назад

Security update for samba and ldb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-05707

Уязвимость компонентов DCE/RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-23192

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-23192

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 4.8
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-23192

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2021-23192

A flaw was found in the way samba implemented DCE/RPC. If a client to ...

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-vffc-r23p-p6rq

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:3650-1

Security update for samba

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1471-1

Security update for samba

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3650-1

Security update for samba

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3649-1

Security update for samba

около 4 лет назад
rocky логотип
RLSA-2021:5082

Important: samba security update

около 4 лет назад
oracle-oval логотип
ELSA-2021-5082

ELSA-2021-5082: samba security update (IMPORTANT)

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3647-1

Security update for samba and ldb

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3647-1

Security update for samba and ldb

около 4 лет назад

Уязвимостей на страницу