Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-0336
HistoryJan 31, 2022 - 12:00 a.m.

CVE-2022-0336

2022-01-3100:00:00
ubuntu.com
ubuntu.com
34

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.3%

The Samba AD DC includes checks when adding service principals names (SPNs)
to an account to ensure that SPNs do not alias with those already in the
database. Some of these checks are able to be bypassed if an account
modification re-adds an SPN that was previously present on that account,
such as one added when a computer is joined to a domain. An attacker who
has the ability to write to an account can exploit this to perform a
denial-of-service attack by adding an SPN that matches an existing service.
Additionally, an attacker who can intercept traffic can impersonate
existing services, resulting in a loss of confidentiality and integrity.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchsamba< 2:4.13.17~dfsg-0ubuntu0.21.04.1UNKNOWN
ubuntu21.10noarchsamba< 2:4.13.17~dfsg-0ubuntu0.21.10.1UNKNOWN
ubuntu22.04noarchsamba< 4.13.17~dfsg-0ubuntu1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.3%