CVE-2022-2031

Source
https://cve.org/CVERecord?id=CVE-2022-2031
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2031.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-2031
Downstream
Related
Published
2022-08-25T18:15:09.837Z
Modified
2026-02-11T13:24:29.482671Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events

Affected versions

ldb-2.*
ldb-2.4.1
ldb-2.4.2
ldb-2.4.3
ldb-2.4.4
ldb-2.5.1
ldb-2.5.2
samba-4.*
samba-4.15.0
samba-4.15.1
samba-4.15.2
samba-4.15.3
samba-4.15.4
samba-4.15.5
samba-4.15.6
samba-4.15.7
samba-4.15.8
samba-4.16.0
samba-4.16.1
samba-4.16.2
samba-4.16.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2031.json"