First published: Mon Apr 03 2023(Updated: )
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.0.0<4.16.10 | |
Samba Samba | >=4.17.0<4.17.7 | |
Samba Samba | =4.18.0 | |
Samba Samba | =4.18.0-rc1 | |
Samba Samba | =4.18.0-rc2 | |
Samba Samba | =4.18.0-rc3 | |
Samba Samba | =4.18.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0922 is a vulnerability in the Samba AD DC administration tool that sends new or reset passwords over a signed-only connection when operating against a remote LDAP server.
CVE-2023-0922 affects Samba versions 4.0.0 to 4.16.10, 4.17.0 to 4.17.7, 4.18.0, 4.18.0-rc1, 4.18.0-rc2, 4.18.0-rc3, and 4.18.0-rc4.
CVE-2023-0922 has a severity rating of medium with a CVSS score of 5.9.
To mitigate CVE-2023-0922, it is recommended to upgrade to a patched version of Samba.
You can find more information about CVE-2023-0922 at the following references: [Link 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/), [Link 2](https://security.gentoo.org/glsa/202309-06), [Link 3](https://security.netapp.com/advisory/ntap-20230406-0007/).