First published: Wed Nov 03 2021(Updated: )
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.10.0<4.13.14 | |
Samba Samba | >=4.14.0<4.14.10 | |
Samba Samba | >=4.15.0<4.15.2 | |
redhat/samba | <0:4.14.5-7.el8_5 | 0:4.14.5-7.el8_5 |
redhat/samba | <0:4.13.3-8.el8_4 | 0:4.13.3-8.el8_4 |
redhat/samba | <0:4.14.5-204.el8 | 0:4.14.5-204.el8 |
redhat/samba | <4.15.2 | 4.15.2 |
redhat/samba | <4.14.10 | 4.14.10 |
redhat/samba | <4.13.14 | 4.13.14 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.1+dfsg-2 |
Setting ~~~ dcesrv:max auth states=0 ~~~ in the smb.conf will provide some mitigation against this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-23192 is a vulnerability found in the way Samba implemented DCE/RPC, allowing an attacker to bypass signature requirements.
The severity of CVE-2021-23192 is high, with a severity value of 7.5.
Samba versions up to 4.15.2, 4.14.10, and 4.13.14 are affected by CVE-2021-23192.
An attacker can exploit CVE-2021-23192 by sending a large DCE/RPC request to a Samba server and replacing later fragments with their own data.
You can find more information about CVE-2021-23192 on the Red Hat Bugzilla and Red Hat Security websites.