### [CVE-2021-23192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192) ![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Affects%20samba%20v4.10.0%20to%204.15.1%2C%20Fixed%20in%20samba%20v4.15.2%2C%20v4.14.10%20and%20v4.13.14.%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20-%20Improper%20Input%20Validation.&color=brightgreen) ### Description A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. ### POC #### Reference - https://ubuntu.com/security/CVE-2021-23192 #### Github No PoCs found on GitHub currently.