First published: Mon Sep 04 2017(Updated: )
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.11+dfsg-0+deb12u1 2:4.17.12+dfsg-0+deb12u1 2:4.19.1+dfsg-4 2:4.19.2+dfsg-1 | |
redhat/samba | <4.4.16 | 4.4.16 |
redhat/samba | <4.5.14 | 4.5.14 |
redhat/samba | <4.6.8 | 4.6.8 |
Samba | <4.4.16 | |
Samba | >=4.5.0<4.5.14 | |
Samba | >=4.6.0<4.6.8 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux workstation | =7.0 | |
HP CIFS/9000 Server | =b.04.05.11.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12151 has a medium severity rating due to its potential to allow attackers to read or alter connection data.
To fix CVE-2017-12151, update Samba to version 4.4.16, 4.5.14, 4.6.8 or later.
Samba versions before 4.4.16, 4.5.14, and 4.6.8 are affected by CVE-2017-12151.
Debian and Red Hat Enterprise Linux versions running affected Samba iterations are vulnerable to CVE-2017-12151.
Yes, CVE-2017-12151 can be exploited remotely, allowing attackers to manipulate the connection.