{"id":"CVE-2017-12150","details":"It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce \"SMB signing\" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.","modified":"2026-05-18T05:49:14.225579490Z","published":"2018-07-26T18:29:00.213Z","related":["SUSE-SU-2017:2650-1","SUSE-SU-2017:2695-1","SUSE-SU-2017:2704-1","SUSE-SU-2017:2715-1","SUSE-SU-2017:2726-1","SUSE-SU-2017:2971-1","SUSE-SU-2017:3155-1","openSUSE-SU-2024:11365-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD"},{"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"redhat:gluster_storage","extracted_events":[{"last_affected":"3.0"}],"cpes":["cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100918"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039401"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2789"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2790"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2791"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2858"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20170921-0001/"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3983"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150"},{"type":"FIX","url":"https://www.samba.org/samba/security/CVE-2017-12150.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"ad4be8a01adacd96c5f0fe1bb87a170ab88d2b88"},{"fixed":"89edb76883be2d19f490ea9b5d898ac37f8b60f1"},{"introduced":"916fab083a8cb5c10365da7f3a85d0bbfde4a30e"},{"fixed":"f261c9a5ef07a0a4230b891b2585c5f21945e196"},{"introduced":"f17816a4ae2bb0ed45561347a4c578ca9ab28ccf"},{"fixed":"be2ffca00a983bc3e599e0eb84ab35c517e9d07c"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"3.0.25"},{"fixed":"4.4.16"},{"introduced":"4.5.0"},{"fixed":"4.5.14"},{"introduced":"4.6.0"},{"fixed":"4.6.8"}],"cpe":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"}}],"versions":["samba-4.5.13","samba-4.6.7","samba-4.5.12","samba-4.5.11","samba-4.6.5","samba-4.6.3","samba-4.5.9","samba-4.6.0","samba-4.5.6","samba-4.5.5","samba-4.5.4","samba-4.5.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-12150.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}