First published: Thu Jul 13 2023(Updated: )
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.17.7+dfsg-1ubuntu1.1 | 2:4.17.7+dfsg-1ubuntu1.1 |
Samba Samba | >=4.17.0<4.17.10 | |
Samba Samba | >=4.18.0<4.18.5 | |
Redhat Storage | =3.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 | |
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.12+dfsg-0+deb12u1 2:4.19.3+dfsg-2 | |
redhat/samba | <4.17.10 | 4.17.10 |
redhat/samba | <4.18.5 | 4.18.5 |
>=4.17.0<4.17.10 | ||
>=4.18.0<4.18.5 | ||
=3.0 | ||
=8.0 | ||
=9.0 | ||
=38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3347 is a vulnerability found in Samba's SMB2 packet signing mechanism.
The severity of CVE-2023-3347 is medium with a severity value of 5.9.
CVE-2023-3347 affects Samba by bypassing the SMB2 packet signing mechanism if certain conditions are met.
To fix CVE-2023-3347, update Samba to version 2:4.17.7+dfsg-1ubuntu1.1 (for Ubuntu), 4.17.10 or 4.18.5 (for Redhat), or the corresponding patched version for your distribution.
For more information about CVE-2023-3347, you can visit the official Samba website at https://www.samba.org/samba/security/CVE-2023-3347.html