Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-2127
HistoryJul 20, 2023 - 3:15 p.m.

CVE-2022-2127

2023-07-2015:15:11
Debian Security Bug Tracker
security-tracker.debian.org
17
samba
out-of-bounds read
vulnerability
ntlm authentication
winbind
length checks
crash

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

41.5%

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba< 2:4.17.10+dfsg-0+deb12u1samba_2:4.17.10+dfsg-0+deb12u1_all.deb
Debian11allsamba< 2:4.13.13+dfsg-1~deb11u6samba_2:4.13.13+dfsg-1~deb11u6_all.deb
Debian999allsamba< 2:4.18.5+dfsg-1samba_2:4.18.5+dfsg-1_all.deb
Debian13allsamba< 2:4.18.5+dfsg-1samba_2:4.18.5+dfsg-1_all.deb

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

41.5%