CVE-2021-23192Improper Input Validation in Samba

Severity
7.5HIGHNVD
OSV5.9
EPSS
0.1%
top 71.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateJun 19

Description

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages8 packages

NVDsamba/samba4.10.04.13.14+2
debiandebian/samba< samba 2:4.13.14+dfsg-1 (bookworm)
Debiansamba/samba< 2:4.13.13+dfsg-1~deb11u2+3
Ubuntusamba/samba< 2:4.13.14+dfsg-0ubuntu0.20.04.4+2
CVEListV5samba/sambaAffects samba v4.10.0 to 4.15.1, Fixed in samba v4.15.2, v4.14.10 and v4.13.14.

Patches

🔴Vulnerability Details

5
GHSA
GHSA-vffc-r23p-p6rq: A flaw was found in the way samba implemented DCE/RPC2022-03-04
OSV
CVE-2021-23192: A flaw was found in the way samba implemented DCE/RPC2022-03-02
OSV
samba regression2021-12-13
OSV
samba regressions2021-12-06
OSV
samba vulnerabilities2021-11-11

📋Vendor Advisories

7
Red Hat
kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable2024-06-19
Microsoft
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request and chose to fragment it an attacker could replace later fragments with their own2022-03-08
Ubuntu
Samba regression2021-12-13
Ubuntu
Samba regressions2021-12-06
Ubuntu
Samba vulnerabilities2021-11-11