← Back to CVEs
CVE-2017-12163
N/ADescription
An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
CVE Details
CVSS v3.1 ScoreN/A
Published7/26/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstationredhat:gluster_storagesamba:samba
Weaknesses (CWE)
CWE-200CWE-200
References
http://www.securityfocus.com/bid/100925(secalert@redhat.com)
http://www.securitytracker.com/id/1039401(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2789(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2790(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2791(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2858(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163(secalert@redhat.com)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20170921-0001/(secalert@redhat.com)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us(secalert@redhat.com)
https://www.debian.org/security/2017/dsa-3983(secalert@redhat.com)
https://www.samba.org/samba/security/CVE-2017-12163.html(secalert@redhat.com)
https://www.synology.com/support/security/Synology_SA_17_57_Samba(secalert@redhat.com)
http://www.securityfocus.com/bid/100925(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039401(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2789(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2790(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2791(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2858(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163(af854a3a-2127-422b-91ae-364da2661108)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20170921-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3983(af854a3a-2127-422b-91ae-364da2661108)
https://www.samba.org/samba/security/CVE-2017-12163.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/support/security/Synology_SA_17_57_Samba(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.