{"id":"CVE-2021-23192","details":"A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.","modified":"2026-04-16T00:08:17.133678253Z","published":"2022-03-02T23:15:08.403Z","related":["ALSA-2021:5082","SUSE-SU-2021:3647-1","SUSE-SU-2021:3649-1","SUSE-SU-2021:3650-1","SUSE-SU-2022:0361-1","openSUSE-SU-2021:1471-1","openSUSE-SU-2021:3647-1","openSUSE-SU-2021:3650-1","openSUSE-SU-2024:11631-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-06"},{"type":"ADVISORY","url":"https://ubuntu.com/security/CVE-2021-23192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019666"},{"type":"FIX","url":"https://www.samba.org/samba/security/CVE-2021-23192.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"25f2fe02a615e2cf906b6fa495acd8ea0aa9998a"},{"fixed":"db11778b57610e24324aa4342f89918f66157d71"},{"introduced":"9b49519cae3e967af9ea48dc5fcfb6c145e31db4"},{"fixed":"9312b1832e5a808a63fc7f9e7d6e70348cc9eb86"},{"introduced":"fc8342bd26d1c55ca5780b427f675f31147b27f9"},{"fixed":"7d0c030d4233974c4b9463dad44efdb05e6186f1"}],"database_specific":{"cpe":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"4.10.0"},{"fixed":"4.13.14"},{"introduced":"4.14.0"},{"fixed":"4.14.10"},{"introduced":"4.15.0"},{"fixed":"4.15.2"}],"source":"CPE_FIELD"}}],"versions":["ldb-2.3.1","ldb-2.3.2","ldb-2.4.1","samba-4.14.0","samba-4.14.3","samba-4.14.5","samba-4.14.6","samba-4.14.7","samba-4.14.8","samba-4.14.9","samba-4.15.0","samba-4.15.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-23192.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}