Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-0336

Опубликовано: 29 авг. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.8

Описание

The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

4.13.17~dfsg-0ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

2:4.13.17~dfsg-0ubuntu0.21.04.1
esm-infra/xenial

not-affected

code not present
focal

released

2:4.13.17~dfsg-0ubuntu0.21.04.1
impish

released

2:4.13.17~dfsg-0ubuntu0.21.10.1
jammy

released

4.13.17~dfsg-0ubuntu1
trusty/esm

not-affected

code not present

Показывать по

EPSS

Процентиль: 43%
0.00205
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
больше 3 лет назад

The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.

CVSS3: 8.8
nvd
почти 3 года назад

The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.

CVSS3: 8.8
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 8.8
debian
почти 3 года назад

The Samba AD DC includes checks when adding service principals names ( ...

CVSS3: 8.8
github
почти 3 года назад

The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.

EPSS

Процентиль: 43%
0.00205
Низкий

8.8 High

CVSS3