vulnerability
Alma Linux: CVE-2023-3347: Moderate: samba security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:C/A:N) | Jul 20, 2023 | Aug 4, 2023 | Jan 30, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
Jul 20, 2023
Added
Aug 4, 2023
Modified
Jan 30, 2025
Description
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
Solution(s)
alma-upgrade-ctdbalma-upgrade-libnetapialma-upgrade-libnetapi-develalma-upgrade-libsmbclientalma-upgrade-libsmbclient-develalma-upgrade-libwbclientalma-upgrade-libwbclient-develalma-upgrade-python3-sambaalma-upgrade-python3-samba-dcalma-upgrade-python3-samba-develalma-upgrade-python3-samba-testalma-upgrade-sambaalma-upgrade-samba-clientalma-upgrade-samba-client-libsalma-upgrade-samba-commonalma-upgrade-samba-common-libsalma-upgrade-samba-common-toolsalma-upgrade-samba-dc-libsalma-upgrade-samba-dcerpcalma-upgrade-samba-develalma-upgrade-samba-krb5-printingalma-upgrade-samba-ldb-ldap-modulesalma-upgrade-samba-libsalma-upgrade-samba-pidlalma-upgrade-samba-testalma-upgrade-samba-test-libsalma-upgrade-samba-toolsalma-upgrade-samba-usersharesalma-upgrade-samba-vfs-iouringalma-upgrade-samba-winbindalma-upgrade-samba-winbind-clientsalma-upgrade-samba-winbind-krb5-locatoralma-upgrade-samba-winbind-modulesalma-upgrade-samba-winexe

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.