CVE-2022-2127

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2127
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2127.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2127
Related
Published
2023-07-20T15:15:11Z
Modified
2024-08-01T07:59:11.184528Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbinddpamauth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events

Affected versions

ldb-2.*

ldb-2.5.1
ldb-2.5.2
ldb-2.5.3

samba-4.*

samba-4.16.0
samba-4.16.1
samba-4.16.2
samba-4.16.3
samba-4.16.4
samba-4.16.5
samba-4.16.6
samba-4.16.7
samba-4.16.8
samba-4.16.9