vulnerability
Red Hat: CVE-2017-12151: Moderate: samba security update (RHSA-2017:2790)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Sep 21, 2017 | Oct 4, 2017 | Jul 9, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Sep 21, 2017
Added
Oct 4, 2017
Modified
Jul 9, 2025
Description
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-libsmbclientredhat-upgrade-libsmbclient-develredhat-upgrade-libwbclientredhat-upgrade-libwbclient-develredhat-upgrade-sambaredhat-upgrade-samba-clientredhat-upgrade-samba-client-libsredhat-upgrade-samba-commonredhat-upgrade-samba-common-libsredhat-upgrade-samba-common-toolsredhat-upgrade-samba-dcredhat-upgrade-samba-dc-libsredhat-upgrade-samba-debuginforedhat-upgrade-samba-develredhat-upgrade-samba-krb5-printingredhat-upgrade-samba-libsredhat-upgrade-samba-pidlredhat-upgrade-samba-pythonredhat-upgrade-samba-testredhat-upgrade-samba-test-libsredhat-upgrade-samba-vfs-glusterfsredhat-upgrade-samba-winbindredhat-upgrade-samba-winbind-clientsredhat-upgrade-samba-winbind-krb5-locatorredhat-upgrade-samba-winbind-modules
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.