Headline
CVE-2021-23192: CVE-2021-23192 | Ubuntu
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Published: 9 November 2021
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Notes
Author
Note
mdeslaur
affects 4.10.0 and later
Status
Package
Release
Status
samba
Launchpad, Ubuntu, Debian
bionic
Not vulnerable (2:4.7.6+dfsg~ubuntu-0ubuntu2.24)
focal
Released (2:4.13.14+dfsg-0ubuntu0.20.04.1)
hirsute
Released (2:4.13.14+dfsg-0ubuntu0.21.04.1)
impish
Released (2:4.13.14+dfsg-0ubuntu0.21.10.1)
jammy
Released (2:4.13.14+dfsg-0ubuntu1)
trusty
Not vulnerable
upstream
Released (4.13.14)
xenial
Not vulnerable
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
- https://www.samba.org/samba/security/CVE-2021-23192.html
- https://www.samba.org/samba/history/samba-4.13.14.html
- https://ubuntu.com/security/notices/USN-5142-1
- NVD
- Launchpad
- Debian
Bugs
- https://bugzilla.samba.org/show_bug.cgi?id=14875
Related news
Gentoo Linux Security Advisory 202309-6 - Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution. Versions greater than or equal to 4.18.4 are affected.
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.