CVE-2022-32742

Source
https://cve.org/CVERecord?id=CVE-2022-32742
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32742.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-32742
Downstream
Related
Published
2022-08-25T18:15:10.430Z
Modified
2026-02-11T13:24:02.949137Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events

Affected versions

ldb-2.*
ldb-2.4.1
ldb-2.4.2
ldb-2.4.3
ldb-2.4.4
ldb-2.5.1
ldb-2.5.2
samba-4.*
samba-4.15.0
samba-4.15.1
samba-4.15.2
samba-4.15.3
samba-4.15.4
samba-4.15.5
samba-4.15.6
samba-4.15.7
samba-4.15.8
samba-4.16.0
samba-4.16.1
samba-4.16.2
samba-4.16.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32742.json"