Untriaged
Samba: smb2 packet signing is not enforced when "server signing = required" is set
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
Affected products
samba
- ==4.17.10
- ==4.18.5
- *
samba4
Matching in nixpkgs
pkgs.samba4
Standard Windows interoperability suite of programs for Linux and Unix
-
nixos-unstable -
- nixpkgs-unstable 4.22.3
pkgs.sambaFull
Standard Windows interoperability suite of programs for Linux and Unix
-
nixos-unstable -
- nixpkgs-unstable 4.22.3
pkgs.samba4Full
Standard Windows interoperability suite of programs for Linux and Unix
-
nixos-unstable -
- nixpkgs-unstable 4.22.3
Package maintainers
-
@aneeshusa Aneesh Agrawal <aneeshusa@gmail.com>
-
@jbedo Justin Bedő <cu@cua0.org>