Vulnerability Description
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 4.16.0, < 4.16.10 |
| Redhat | Enterprise Linux | 6.0 |
| Fedoraproject | Fedora | 37 |
| Debian | Debian Linux | 12.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
- https://access.redhat.com/errata/RHSA-2024:0423
- https://access.redhat.com/errata/RHSA-2024:0580
- https://access.redhat.com/security/cve/CVE-2022-2127Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2222791Issue TrackingThird Party Advisory
- https://www.samba.org/samba/security/CVE-2022-2127.htmlMitigationVendor Advisory
- https://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
- https://access.redhat.com/errata/RHSA-2024:0423
- https://access.redhat.com/errata/RHSA-2024:0580
- https://access.redhat.com/security/cve/CVE-2022-2127Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2222791Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2022-2127?
CVE-2022-2127 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenge...
How severe is CVE-2022-2127?
CVE-2022-2127 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2127?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Redhat Enterprise Linux, Fedoraproject Fedora, Debian Debian Linux.