Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-2127

Опубликовано: 20 июл. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.9

Описание

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2:4.18.5+dfsg-1ubuntu1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.3
esm-infra/xenial

needs-triage

focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.3
jammy

released

2:4.15.13+dfsg-0ubuntu1.2
kinetic

released

2:4.16.8+dfsg-0ubuntu1.2
lunar

released

2:4.17.7+dfsg-1ubuntu1.1

Показывать по

EPSS

Процентиль: 78%
0.0115
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

CVSS3: 5.9
nvd
около 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

CVSS3: 5.9
debian
около 2 лет назад

An out-of-bounds read vulnerability was found in Samba due to insuffic ...

suse-cvrf
около 2 лет назад

Security update for samba

suse-cvrf
около 2 лет назад

Security update for samba

EPSS

Процентиль: 78%
0.0115
Низкий

5.9 Medium

CVSS3