QID 354310

Date Published: 2022-12-21

QID 354310: Amazon Linux Security Advisory for samba : ALAS2022-2022-022

a flaw was found in the way samba implemented smb1 authentication.
An attacker could use this flaw to retrieve the plaintext password sent over the wire even if kerberos authentication was required. (
( CVE-2016-2124) a flaw was found in the way samba maps domain users to local users.
An authenticated attacker could use this flaw to cause possible privilege escalation. (
( CVE-2020-25717) a flaw was found in the way samba, as an active directory domain controller, is able to support an rodc (read-only domain controller).
This would allow an rodc to print administrator tickets. (
( CVE-2020-25718) a flaw was found in the way samba, as an active directory domain controller, implemented kerberos name-based authentication.
the samba ad dc, could become confused about the user a ticket represents if it did not strictly require a kerberos pac and always use the sids found within.
The result could include total domain compromise. (
( CVE-2020-25719) kerberos acceptors need easy access to stablead identifiers (eg objectsid) (cve-2020-25721) multiple flaws were found in the way samba ad dc implemented access and conformance checking of stored data.
An attacker could use this flaw to cause total domain compromise. (
( CVE-2020-25722) a flaw was found in the way samba handled file/directory metadata.
This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share. (
( CVE-2021-20316) a flaw was found in the way samba implemented dce/rpc.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-022 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-022 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-022.html