CVE-2022-3437
Published: 27 October 2022
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
Notes
Author | Note |
---|---|
mdeslaur | The focal samba update was temporarily reverted by USN 5822-2 because it introduced regressions. It was later updated again with USN 5936-1. |
rodrigo-zaiden | heimdal patch f6edaafc introduced a new issue, assigned as CVE-2022-45142. |
Priority
Status
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
- https://www.samba.org/samba/security/CVE-2022-3437.html
- https://github.com/heimdal/heimdal/security/advisories/GHSA-45j3-5v39-rf9j
- https://ubuntu.com/security/notices/USN-5800-1
- https://ubuntu.com/security/notices/USN-5822-1
- https://ubuntu.com/security/notices/USN-5822-2
- https://ubuntu.com/security/notices/USN-5936-1
- NVD
- Launchpad
- Debian