In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Access Control vulnerabilities in an interactive lesson.
Start learningUpgrade RHEL:7
libsmbclient
to version 0:4.2.10-7.el7_2 or higher.
This issue was patched in RHSA-2016:1486
.
Note: Versions mentioned in the description apply only to the upstream libsmbclient
package and not the libsmbclient
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.