QID 354257

Date Published: 2022-12-12

QID 354257: Amazon Linux Security Advisory for samba : ALAS-2022-1642

It was found that the kerberos key distribution center (kdc) delegation feature, service for user (s4u), did not sufficiently protect the tickets it's providing from tempering.
A malicious, authenticated service principal allowed to delegate could use this flaw to impersonate a non-forwardable user. (
( CVE-2020-17049) a flaw was found in samba.
Some smb1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data.
The client cannot control the area of the server memory written to the file (or printer). (
( CVE-2022-32742) a flaw was found in samba.
The kdc accepts kpasswd requests encrypted with any key known to it.
By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. (
( CVE-2022-32744) a flaw was found in samba.
Samba ad users can cause the server to access uninitialized data with an ldap add or modify the request, usually resulting in a segmentation fault. (
( CVE-2022-32745) a flaw was found in the samba ad ldap server.
The ad dc database audit logging module can access ldap message values freed by a preceding database module, resulting in a use-after-free issue.
This issue is only possible when modifying certain privileged attributes, such as useraccountcontrol. (
( CVE-2022-32746)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1642 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1642 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1642.html