vulnerability

FreeBSD: VID-f9140ad4-4920-11ed-a07e-080027f5fec9 (CVE-2022-32744): samba -- Multiple vulnerabilities

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Oct 11, 2022
Added
Nov 4, 2022
Modified
Dec 10, 2025

Description

The Samba Team reports: CVE-2022-2031 The KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password can exploit this to obtain and use tickets to other services. CVE-2022-32744 The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change the passwords of other users, enabling full domain takeover. CVE-2022-32745 Samba AD users can cause the server to access uninitialised data with an LDAP add or modify request, usually resulting in a segmentation fault. CVE-2022-32746 The AD DC database audit logging module can be made to access LDAP message values that have been freed by a preceding database module, resulting in a use-after-free. This is only possible when modifying certain privileged attributes, such as userAccountControl. CVE-2022-32742 SMB1 Client with write access to a share can cause server memory contents to be written into a file or printer.

Solutions

freebsd-upgrade-package-samba412freebsd-upgrade-package-samba413
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.