A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 4.10.0 (including) | 4.13.14 (excluding) |
Samba | Samba | 4.14.0 (including) | 4.14.10 (excluding) |
Samba | Samba | 4.15.0 (including) | 4.15.2 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | samba-0:4.14.5-7.el8_5 | * |
Red Hat Enterprise Linux 8 | RedHat | samba-0:4.14.5-7.el8_5 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | samba-0:4.13.3-8.el8_4 | * |
Red Hat Gluster Storage 3.5 for RHEL 8 | RedHat | samba-0:4.14.5-204.el8rhgs | * |
Samba | Ubuntu | devel | * |
Samba | Ubuntu | focal | * |
Samba | Ubuntu | hirsute | * |
Samba | Ubuntu | impish | * |
Samba | Ubuntu | jammy | * |
Samba | Ubuntu | upstream | * |