A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5003-1 | samba security update |
EUVD |
EUVD-2021-10299 | A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. |
Ubuntu USN |
USN-5142-1 | Samba vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T19:05:55.765Z
Reserved: 2021-10-20T00:00:00.000Z
Link: CVE-2021-23192
No data.
Status : Modified
Published: 2022-03-02T23:15:08.403
Modified: 2024-11-21T05:51:21.080
Link: CVE-2021-23192
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN