Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2022-32744

Published: 27 July 2022

A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.

Notes

AuthorNote
mdeslaur
patches for this issue in the bug for CVE-2022-2031
Fixing this in Ubuntu 18.04 LTS would require substantial
code backports. We will not be fixing this issue in Ubuntu 18.04
LTS. In environments where this is of concern, we recommend
updating to a more recent Ubuntu version, or disabling kpasswd
if this is not passible.

Mitigation

kpasswd is not a critical protocol for the AD DC in most installations, it
can be disabled by setting "kpasswd port = 0" in the smb.conf.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
bionic Ignored

focal
Released (2:4.13.17~dfsg-0ubuntu1.20.04.1)
impish Ignored
(reached end-of-life)
jammy
Released (2:4.15.9+dfsg-0ubuntu0.2)
kinetic
Released (2:4.16.4+dfsg-2ubuntu1)
trusty Needs triage

upstream Needs triage

xenial Needs triage