Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2127

Опубликовано: 20 июл. 2023
Источник: debian
EPSS Низкий

Описание

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.18.5+dfsg-1package

Примечания

  • https://www.samba.org/samba/security/CVE-2022-2127.html

  • In scope for continued Samba support

EPSS

Процентиль: 79%
0.01247
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

CVSS3: 5.9
redhat
больше 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

CVSS3: 5.9
nvd
больше 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

suse-cvrf
больше 2 лет назад

Security update for samba

suse-cvrf
больше 2 лет назад

Security update for samba

EPSS

Процентиль: 79%
0.01247
Низкий