First published: Thu Aug 25 2022(Updated: )
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | <4.14.14 | |
Samba Samba | >=4.15.0<4.15.9 | |
Samba Samba | >=4.16.0<4.16.4 | |
<4.14.14 | ||
>=4.15.0<4.15.9 | ||
>=4.16.0<4.16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32742 is a vulnerability found in Samba that allows server memory contents to be written into a file or printer instead of client-supplied data.
The severity of CVE-2022-32742 is medium with a CVSS score of 4.3.
Versions up to and including 4.14.14, 4.15.0 to 4.15.9, and 4.16.0 to 4.16.4 of Samba are affected by CVE-2022-32742.
To fix CVE-2022-32742, it is recommended to update Samba to a patched version provided by the vendor or apply the necessary security patches.
You can find more information about CVE-2022-32742 at the following references: [Gentoo Security Advisory](https://security.gentoo.org/glsa/202309-06) and [Samba Security](https://www.samba.org/samba/security/CVE-2022-32742.html).