Description
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5003-1 | samba security update |
EUVD |
EUVD-2021-10299 | A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. |
Ubuntu USN |
USN-5142-1 | Samba vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T19:05:55.765Z
Reserved: 2021-10-20T00:00:00.000Z
Link: CVE-2021-23192
No data.
Status : Modified
Published: 2022-03-02T23:15:08.403
Modified: 2024-11-21T05:51:21.080
Link: CVE-2021-23192
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN