Lucene search

K
f5F5F5:K21571420
HistoryAug 05, 2022 - 12:00 a.m.

K21571420 : Multiple Samba vulnerabilities

2022-08-0500:00:00
my.f5.com
27
samba
vulnerabilities
kdc
kpasswd
smb1
write requests
ldap
server memory
security advisory

AI Score

6.5

Confidence

High

EPSS

0.043

Percentile

92.4%

Security Advisory Description

A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other’s tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.

A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).

A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users’ passwords, enabling full domain takeover.

A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.

A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.