Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-32744
HistoryJul 27, 2022 - 12:00 a.m.

CVE-2022-32744

2022-07-2700:00:00
ubuntu.com
ubuntu.com
40
samba
kdc
passwordchange
domain takeover
securityflaw

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

42.9%

A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with
any key known to it. By encrypting forged kpasswd requests with its own
key, a user can change other users’ passwords, enabling full domain
takeover.

Bugs

Notes

Author Note
mdeslaur patches for this issue in the bug for CVE-2022-2031 Fixing this in Ubuntu 18.04 LTS would require substantial code backports. We will not be fixing this issue in Ubuntu 18.04 LTS. In environments where this is of concern, we recommend updating to a more recent Ubuntu version, or disabling kpasswd if this is not passible.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchsamba< 2:4.13.17~dfsg-0ubuntu1.20.04.1UNKNOWN
ubuntu22.04noarchsamba< 2:4.15.9+dfsg-0ubuntu0.2UNKNOWN
ubuntu22.10noarchsamba< 2:4.16.4+dfsg-2ubuntu1UNKNOWN
ubuntu23.04noarchsamba< 2:4.16.4+dfsg-2ubuntu1UNKNOWN
ubuntu23.10noarchsamba< 2:4.16.4+dfsg-2ubuntu1UNKNOWN
ubuntu24.04noarchsamba< 2:4.16.4+dfsg-2ubuntu1UNKNOWN
ubuntu14.04noarchsamba< anyUNKNOWN
ubuntu16.04noarchsamba< anyUNKNOWN

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

42.9%