← Volver a CVEs
CVE-2021-23192
HIGH7.5
Descripcion
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/2/2022
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
samba:samba
Debilidades (CWE)
CWE-20
Referencias
https://bugzilla.redhat.com/show_bug.cgi?id=2019666(secalert@redhat.com)
https://security.gentoo.org/glsa/202309-06(secalert@redhat.com)
https://ubuntu.com/security/CVE-2021-23192(secalert@redhat.com)
https://www.samba.org/samba/security/CVE-2021-23192.html(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2019666(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202309-06(af854a3a-2127-422b-91ae-364da2661108)
https://ubuntu.com/security/CVE-2021-23192(af854a3a-2127-422b-91ae-364da2661108)
https://www.samba.org/samba/security/CVE-2021-23192.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.