CVE-2017-12151
Publication date 20 September 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
samba | ||
16.04 LTS xenial |
Fixed 2:4.3.11+dfsg-0ubuntu0.16.04.11
|
|
14.04 LTS trusty |
Fixed 2:4.3.11+dfsg-0ubuntu0.14.04.12
|
Patch details
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.4 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3426-1
- Samba vulnerabilities
- 21 September 2017