CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
92.4%
Fixed AD restrictions bypass associated with changing passwords (bsc#1201495). (CVE-2022-2031) Fixed a memory leak in SMB1 (bsc#1201496). (CVE-2022-32742) Fixed an arbitrary password change request for any AD user (bsc#1201493). (CVE-2022-32744) Fixed a remote server crash with an LDAP add or modify request (bsc#1201492) (CVE-2022-32745) Fixed a use-after-free occurring in database audit logging (bsc#1201490). (CVE-2022-32746)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | ldb | < 2.3.4-1 | ldb-2.3.4-1.mga8 |
Mageia | 8 | noarch | samba | < 4.14.14-1 | samba-4.14.14-1.mga8 |
Mageia | 8 | noarch | sssd | < 2.4.0-1.4 | sssd-2.4.0-1.4.mga8 |
bugs.mageia.org/show_bug.cgi?id=30675
lists.fedoraproject.org/archives/list/[email protected]/thread/2RORIRLFLRNQOCVXQU4V3RLZ5C2G75L2/
lists.opensuse.org/archives/list/[email protected]/thread/CKTUJ63ZYTQNYFNRWGXIE3KBEFGJXGJL/
ubuntu.com/security/notices/USN-5542-1
www.debian.org/security/2022/dsa-5205
www.samba.org/samba/security/CVE-2022-2031.html
www.samba.org/samba/security/CVE-2022-32742.html
www.samba.org/samba/security/CVE-2022-32744.html
www.samba.org/samba/security/CVE-2022-32745.html
www.samba.org/samba/security/CVE-2022-32746.html