MEDIUM · 5.9

CVE-2022-2127

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenge...

Vulnerability Description

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.

CVSS Score

5.9

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
SambaSamba>= 4.16.0, < 4.16.10
RedhatEnterprise Linux6.0
FedoraprojectFedora37
DebianDebian Linux12.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-2127?

CVE-2022-2127 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenge...

How severe is CVE-2022-2127?

CVE-2022-2127 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-2127?

Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Redhat Enterprise Linux, Fedoraproject Fedora, Debian Debian Linux.