Vulnerability CVE-2017-12151


Published: 2018-07-27

Description:
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.

Type:

CWE-310

(Cryptographic Issues)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Samba -> Samba 
Redhat -> Enterprise linux 
Redhat -> Enterprise linux desktop 
Redhat -> Enterprise linux server aus 
Redhat -> Enterprise linux server eus 
Redhat -> Enterprise linux workstation 
HP -> Cifs server 
Debian -> Debian linux 

 References:
http://www.securityfocus.com/bid/100917
http://www.securitytracker.com/id/1039401
https://access.redhat.com/errata/RHSA-2017:2790
https://access.redhat.com/errata/RHSA-2017:2858
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151
https://security.netapp.com/advisory/ntap-20170921-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
https://www.debian.org/security/2017/dsa-3983
https://www.samba.org/samba/security/CVE-2017-12151.html

Copyright 2024, cxsecurity.com

 

Back to Top