Release Date: | 2018-07-27 | |
Impact: | Moderate | What is this? |
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
See more information about CVE-2017-12151 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 7.4 |
Vector String: | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
Version: | 3.0 |
Attack Vector: | Network |
Attack Complexity: | High |
Privileges Required: | None |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality Impact: | High |
Integrity Impact: | High |
Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Linux version 7 (samba) | ELSA-2017-2790 | 2017-09-26 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: