← Retour aux CVEs
CVE-2022-2127
MEDIUM5.9
Description
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
Details CVE
Score CVSS v3.15.9
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie7/20/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
debian:debian_linuxfedoraproject:fedoraredhat:enterprise_linuxsamba:samba
Faiblesses (CWE)
CWE-125CWE-125
References
https://access.redhat.com/errata/RHSA-2023:6667(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7139(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0423(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0580(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2022-2127(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2222791(secalert@redhat.com)
https://www.samba.org/samba/security/CVE-2022-2127.html(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:6667(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7139(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0423(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0580(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2022-2127(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2222791(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230731-0010/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5477(af854a3a-2127-422b-91ae-364da2661108)
https://www.samba.org/samba/security/CVE-2022-2127.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.