← Voltar para CVEs
CVE-2017-12150
HIGH7.4
Descricao
It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
Detalhes CVE
Pontuacao CVSS v3.17.4
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado7/26/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstationredhat:gluster_storagesamba:samba
Fraquezas (CWE)
CWE-300
Referencias
http://www.securityfocus.com/bid/100918(secalert@redhat.com)
http://www.securitytracker.com/id/1039401(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2789(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2790(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2791(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2858(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150(secalert@redhat.com)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20170921-0001/(secalert@redhat.com)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us(secalert@redhat.com)
https://www.debian.org/security/2017/dsa-3983(secalert@redhat.com)
https://www.samba.org/samba/security/CVE-2017-12150.html(secalert@redhat.com)
http://www.securityfocus.com/bid/100918(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039401(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2789(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2790(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2791(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2858(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150(af854a3a-2127-422b-91ae-364da2661108)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20170921-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3983(af854a3a-2127-422b-91ae-364da2661108)
https://www.samba.org/samba/security/CVE-2017-12150.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.