HomeSambaCVE-2021-23192

CVE-2021-23192

HIGH
7.5CVSS
Published: 2022-03-02
Updated: 2024-11-21
AI Analysis

Description

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-20NVD-CWE-noinfo

Metadata

Primary Vendor
SAMBA
Published
3/2/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

samba : sambasamba : sambasamba : samba

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-23192 | HIGH Severity | CVEDatabase.com | CVEDatabase.com