Vulnerability Description
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 4.1.0, < 4.17.0 |
| Fedoraproject | Fedora | 37 |
Related Weaknesses (CWE)
References
- https://bugzilla.samba.org/show_bug.cgi?id=14833Issue TrackingVendor Advisory
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d6ExploitPatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202309-06Third Party Advisory
- https://bugzilla.samba.org/show_bug.cgi?id=14833Issue TrackingVendor Advisory
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d6ExploitPatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202309-06Third Party Advisory
FAQ
What is CVE-2022-32743?
CVE-2022-32743 is a vulnerability with a CVSS score of 7.5 (HIGH). Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
How severe is CVE-2022-32743?
CVE-2022-32743 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32743?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Fedoraproject Fedora.