{"api_version":"1","generated_at":"2026-04-23T05:07:29+00:00","cve":"CVE-2022-3437","urls":{"html":"https://cve.report/CVE-2022-3437","api":"https://cve.report/api/cve/CVE-2022-3437.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3437","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3437"},"summary":{"title":"CVE-2022-3437","description":"A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-01-12 15:15:00","updated_at":"2023-11-07 03:51:00"},"problem_types":["CWE-122"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/02/08/1","name":"[oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure","refsource":"MLIST","tags":[],"title":"oss-security - [vs] heimdal: CVE-2022-45142: signature validation failure","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/security/cve/CVE-2022-3437","name":"https://access.redhat.com/security/cve/CVE-2022-3437","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774","refsource":"MISC","tags":[],"title":"2137774 – (CVE-2022-3437) CVE-2022-3437 samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.samba.org/samba/security/CVE-2022-3437.html","name":"https://www.samba.org/samba/security/CVE-2022-3437.html","refsource":"MISC","tags":[],"title":"Samba - Security Announcement Archive","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"https://security.gentoo.org/glsa/202309-06","name":"GLSA-202309-06","refsource":"GENTOO","tags":[],"title":"Samba: Multiple Vulnerabilities (GLSA 202309-06) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20230216-0008/","name":"https://security.netapp.com/advisory/ntap-20230216-0008/","refsource":"CONFIRM","tags":[],"title":"December 2022 Heimdal Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202310-06","name":"GLSA-202310-06","refsource":"GENTOO","tags":[],"title":"Heimdal: Multiple Vulnerabilities (GLSA 202310-06) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3437","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3437","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3437","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3437","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3437","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"samba","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-3437","qid":"181242","title":"Debian Security Update for heimdal (DSA 5287-1)"},{"cve":"CVE-2022-3437","qid":"181249","title":"Debian Security Update for heimdal (DLA 3206-1)"},{"cve":"CVE-2022-3437","qid":"181550","title":"Debian Security Update for heimdal (DLA 3311-1)"},{"cve":"CVE-2022-3437","qid":"181552","title":"Debian Security Update for heimdal (DSA 5344-1)"},{"cve":"CVE-2022-3437","qid":"183706","title":"Debian Security Update for sambaheimdal (CVE-2022-3437)"},{"cve":"CVE-2022-3437","qid":"199102","title":"Ubuntu Security Notification for Heimdal Vulnerabilities (USN-5800-1)"},{"cve":"CVE-2022-3437","qid":"199130","title":"Ubuntu Security Notification for Samba Vulnerabilities (USN-5822-1)"},{"cve":"CVE-2022-3437","qid":"199228","title":"Ubuntu Security Notification for Samba Vulnerabilities (USN-5936-1)"},{"cve":"CVE-2022-3437","qid":"283246","title":"Fedora Security Update for samba (FEDORA-2022-3dcb5a3785)"},{"cve":"CVE-2022-3437","qid":"283360","title":"Fedora Security Update for heimdal (FEDORA-2022-dba9ba8e2b)"},{"cve":"CVE-2022-3437","qid":"283361","title":"Fedora Security Update for heimdal (FEDORA-2022-cbbd105d08)"},{"cve":"CVE-2022-3437","qid":"283375","title":"Fedora Security Update for samba (FEDORA-2022-003403ec6b)"},{"cve":"CVE-2022-3437","qid":"283404","title":"Fedora Security Update for heimdal (FEDORA-2022-2c77cee4b5)"},{"cve":"CVE-2022-3437","qid":"283455","title":"Fedora Security Update for samba (FEDORA-2022-8a9a568dbe)"},{"cve":"CVE-2022-3437","qid":"355336","title":"Amazon Linux Security Advisory for samba : ALAS2023-2023-032"},{"cve":"CVE-2022-3437","qid":"502599","title":"Alpine Linux Security Update for heimdal"},{"cve":"CVE-2022-3437","qid":"502620","title":"Alpine Linux Security Update for samba"},{"cve":"CVE-2022-3437","qid":"502655","title":"Alpine Linux Security Update for heimdal"},{"cve":"CVE-2022-3437","qid":"502790","title":"Alpine Linux Security Update for samba"},{"cve":"CVE-2022-3437","qid":"503810","title":"Alpine Linux Security Update for samba"},{"cve":"CVE-2022-3437","qid":"503994","title":"Alpine Linux Security Update for heimdal"},{"cve":"CVE-2022-3437","qid":"6000543","title":"Debian Security Update for samba (DSA 5647-1)"},{"cve":"CVE-2022-3437","qid":"672496","title":"EulerOS Security Update for samba (EulerOS-SA-2023-1021)"},{"cve":"CVE-2022-3437","qid":"672515","title":"EulerOS Security Update for samba (EulerOS-SA-2023-1046)"},{"cve":"CVE-2022-3437","qid":"672630","title":"EulerOS Security Update for samba (EulerOS-SA-2023-1371)"},{"cve":"CVE-2022-3437","qid":"672635","title":"EulerOS Security Update for samba (EulerOS-SA-2023-1399)"},{"cve":"CVE-2022-3437","qid":"673107","title":"EulerOS Security Update for samba (EulerOS-SA-2023-2168)"},{"cve":"CVE-2022-3437","qid":"690965","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for samba (1c5f3fd7-54bf-11ed-8d1e-005056a311d1)"},{"cve":"CVE-2022-3437","qid":"710751","title":"Gentoo Linux Samba Multiple Vulnerabilities (GLSA 202309-06)"},{"cve":"CVE-2022-3437","qid":"710767","title":"Gentoo Linux Heimdal Multiple Vulnerabilities (GLSA 202310-06)"},{"cve":"CVE-2022-3437","qid":"752999","title":"SUSE Enterprise Linux Security Update for samba (SUSE-SU-2022:4395-1)"},{"cve":"CVE-2022-3437","qid":"753517","title":"SUSE Enterprise Linux Security Update for samba (SUSE-SU-2023:0081-1)"},{"cve":"CVE-2022-3437","qid":"753587","title":"SUSE Enterprise Linux Security Update for samba (SUSE-SU-2023:0160-1)"},{"cve":"CVE-2022-3437","qid":"905264","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for samba (12995)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-3437","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"samba","version":{"version_data":[{"version_value":"Fixed in samba 4.15.11, samba 4.16.6, samba 4.17.2."}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-122 - Heap-based Buffer Overflow, CWE-787 - Out-of-bounds Write"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774"},{"refsource":"MISC","name":"https://www.samba.org/samba/security/CVE-2022-3437.html","url":"https://www.samba.org/samba/security/CVE-2022-3437.html"},{"refsource":"MISC","name":"https://access.redhat.com/security/cve/CVE-2022-3437","url":"https://access.redhat.com/security/cve/CVE-2022-3437"},{"refsource":"MLIST","name":"[oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure","url":"http://www.openwall.com/lists/oss-security/2023/02/08/1"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20230216-0008/","url":"https://security.netapp.com/advisory/ntap-20230216-0008/"},{"refsource":"GENTOO","name":"GLSA-202309-06","url":"https://security.gentoo.org/glsa/202309-06"},{"refsource":"GENTOO","name":"GLSA-202310-06","url":"https://security.gentoo.org/glsa/202310-06"}]},"description":{"description_data":[{"lang":"eng","value":"A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack."}]}},"nvd":{"publishedDate":"2023-01-12 15:15:00","lastModifiedDate":"2023-11-07 03:51:00","problem_types":["CWE-122"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17.0","versionEndExcluding":"4.17.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16.0","versionEndExcluding":"4.16.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.15.11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}