vulnerability

Alma Linux: CVE-2023-3347: Moderate: samba security and bug fix update (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
Jul 20, 2023
Added
Aug 4, 2023
Modified
Jan 30, 2025

Description

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

Solution(s)

alma-upgrade-ctdbalma-upgrade-libnetapialma-upgrade-libnetapi-develalma-upgrade-libsmbclientalma-upgrade-libsmbclient-develalma-upgrade-libwbclientalma-upgrade-libwbclient-develalma-upgrade-python3-sambaalma-upgrade-python3-samba-dcalma-upgrade-python3-samba-develalma-upgrade-python3-samba-testalma-upgrade-sambaalma-upgrade-samba-clientalma-upgrade-samba-client-libsalma-upgrade-samba-commonalma-upgrade-samba-common-libsalma-upgrade-samba-common-toolsalma-upgrade-samba-dc-libsalma-upgrade-samba-dcerpcalma-upgrade-samba-develalma-upgrade-samba-krb5-printingalma-upgrade-samba-ldb-ldap-modulesalma-upgrade-samba-libsalma-upgrade-samba-pidlalma-upgrade-samba-testalma-upgrade-samba-test-libsalma-upgrade-samba-toolsalma-upgrade-samba-usersharesalma-upgrade-samba-vfs-iouringalma-upgrade-samba-winbindalma-upgrade-samba-winbind-clientsalma-upgrade-samba-winbind-krb5-locatoralma-upgrade-samba-winbind-modulesalma-upgrade-samba-winexe
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.