[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2022-1642 --- samba

ID: oval:org.secpod.oval:def:1601603Date: (C)2022-12-13   (M)2024-04-29
Class: PATCHFamily: unix




It was found that the Kerberos Key Distribution Center delegation feature, Service for User , did not sufficiently protect the tickets it's providing from tempering. A malicious, authenticated service principal allowed to delegate could use this flaw to impersonate a non-forwardable user. A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file instead of client-supplied data. The client cannot control the area of the server memory written to the file . A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl

Platform:
Amazon Linux AMI
Product:
samba
ctdb
libwbclient
libsmbclient
Reference:
ALAS-2022-1642
CVE-2020-17049
CVE-2022-32742
CVE-2022-32744
CVE-2022-32745
CVE-2022-32746
CVE    5
CVE-2022-32744
CVE-2022-32745
CVE-2020-17049
CVE-2022-32746
...

© SecPod Technologies