CVE-2022-32744

Updated: 2023-01-31 16:05:40.927719

Description:

A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 8.8

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 8.4 ELS samba 4.13.3-5 8.8 HIGH Not Vulnerable 2022-08-30 08:02:16
CentOS 8.5 ELS samba 4.14.5-7 8.8 HIGH Not Vulnerable 2022-08-30 08:02:16
Ubuntu 16.04 ELS samba 4.3.11 8.8 HIGH Ignored 2023-01-31 16:05:40
Ubuntu 18.04 ELS samba 4.7.6 8.8 HIGH Needs Triage 2023-03-01 16:02:09

Statement

We’ve reasoned not to fix this vulnerability taking into account that kpasswd is not a critical protocol for the AD DC in most installations and the substantial amount of code backports this fix would require. kpasswd in samba configurations can be disabled by setting "kpasswd port = 0" in the smb.conf