| VID |
23305 |
| Severity |
30 |
| Port |
139 |
| Protocol |
TCP |
| Class |
Samba |
| Detailed Description |
The version of Samba running on the remote host is 4.5.x, 4.6.x, 4.7.x, 4.8.x, 4.9.x prior to 4.9.15. It is, therefore, affected by a password complexity check bypass vulnerability. An authenticated attacker could use this flaw to change their password to a weak password that fails the configured password complexity check.
* References: https://www.samba.org/samba/security/CVE-2019-14833.html
* Platforms Affected: Samba Project, Samba versions 4.5.x, 4.6.x, 4.7.x, 4.8.x, 4.9.x before 4.9.15 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Samba 4.9.15 or later, available from the Samba Web site at https://www.samba.org/samba/download/ |
| Related URL |
CVE-2019-14833 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|