ASA-202009-17 - log back

ASA-202009-17 edited at 06 Oct 2020 20:12:49
Workaround
- Ensure you do not have an schannel directive and if you do make sure it's either = yes or = auto.
+ Ensure you do not have an schannel directive and if you do make sure
+ it's either = yes or = auto.
ASA-202009-17 edited at 06 Oct 2020 20:12:01
Workaround
- Ensure you do not have an schannel directive and if you do make sure it's either = yes or = auto. The correct configuration should be
+ Ensure you do not have an schannel directive and if you do make sure it's either = yes or = auto.
ASA-202009-17 edited at 29 Sep 2020 18:53:07
Impact
- An unauthenticated attacker can gain administrator access through crafted traffic.
+ An unauthenticated attacker can gain administrator access through crafted traffic, if the samba server is configured to run with a vulnerable schannel directive.
ASA-202009-17 edited at 29 Sep 2020 18:44:46
Workaround
- This flaw can be mitigated by using "server schannel = yes" in the smb.conf configuration file.
+ Ensure you do not have an schannel directive and if you do make sure it's either = yes or = auto. The correct configuration should be
ASA-202009-17 edited at 29 Sep 2020 17:14:03
Workaround
+ This flaw can be mitigated by using "server schannel = yes" in the smb.conf configuration file.
ASA-202009-17 edited at 29 Sep 2020 17:01:38
Impact
+ An unauthenticated attacker can gain administrator access through crafted traffic.
ASA-202009-17 created at 29 Sep 2020 16:52:28