First published: Tue Sep 05 2017(Updated: )
It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.11+dfsg-0+deb12u1 2:4.17.12+dfsg-0+deb12u1 2:4.19.1+dfsg-4 2:4.19.2+dfsg-1 | |
redhat/samba | <4.6.8 | 4.6.8 |
redhat/samba | <4.5.14 | 4.5.14 |
redhat/samba | <4.4.16 | 4.4.16 |
redhat/samba | <4.7.0 | 4.7.0 |
Samba | >=3.0.25<4.4.16 | |
Samba | >=4.5.0<4.5.14 | |
Samba | >=4.6.0<4.6.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
redhat gluster storage | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12150 is classified as a medium severity vulnerability.
To fix CVE-2017-12150, upgrade Samba to versions 4.4.16, 4.5.14, 4.6.8 or later.
CVE-2017-12150 allows a remote attacker to perform a man-in-the-middle attack.
CVE-2017-12150 affects Samba versions prior to 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8.
The lack of SMB signing in CVE-2017-12150 allows attackers to retrieve information in plain-text.