[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254202

 
 

909

 
 

198060

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-0336Date: (C)2022-02-17   (M)2024-05-24


The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score :
Exploit Score: 2.8Exploit Score:
Impact Score: 5.9Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: LOWAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
GLSA-202309-06
https://access.redhat.com/security/cve/CVE-2022-0336
https://bugzilla.redhat.com/show_bug.cgi?id=2046134
https://bugzilla.samba.org/show_bug.cgi?id=14950
https://github.com/samba-team/samba/commit/1a5dc817c0c9379bbaab14c676681b42b0039a3c
https://github.com/samba-team/samba/commit/c58ede44f382bd0125f761f0479c8d48156be400
https://www.samba.org/samba/security/CVE-2022-0336.html

CWE    1
CWE-276
OVAL    11
oval:org.secpod.oval:def:78195
oval:org.secpod.oval:def:89045963
oval:org.secpod.oval:def:77536
oval:org.secpod.oval:def:121544
...

© SecPod Technologies