First published: Wed Jan 26 2022(Updated: )
As per samba upstream advisory: The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.13.17 | 4.13.17 |
redhat/samba | <4.14.12 | 4.14.12 |
redhat/samba | <4.15.4 | 4.15.4 |
Samba | >=4.0.0<4.13.17 | |
Samba | >=4.14.0<4.14.12 | |
Samba | >=4.15.0<4.15.4 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0336 is a vulnerability in Samba AD DC that allows bypassing checks when adding service principals names (SPNs) to an account, potentially leading to unauthorized access.
CVE-2022-0336 has a severity rating of 8.8 which is considered high.
CVE-2022-0336 affects Samba AD DC by allowing the bypassing of checks when adding service principals names (SPNs) to an account.
To fix CVE-2022-0336, you should upgrade Samba to version 4.13.17, 4.14.12, or 4.15.4 depending on your installed version.
You can find more information about CVE-2022-0336 on the Red Hat Security Advisory, Bugzilla reports, and the official CVE page.