An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3792-1 samba security update
Debian DSA Debian DSA DSA-5477-1 samba security update
Debian DSA Debian DSA DSA-5647-1 samba security update
EUVD EUVD EUVD-2022-34413 An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
Ubuntu USN Ubuntu USN USN-6238-1 Samba vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-08-30T01:55:37.668Z

Reserved: 2022-06-18T15:45:19.770Z

Link: CVE-2022-2127

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.251Z

cve-icon NVD

Status : Modified

Published: 2023-07-20T15:15:11.183

Modified: 2024-11-21T07:00:22.237

Link: CVE-2022-2127

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-19T00:00:00Z

Links: CVE-2022-2127 - Bugzilla

cve-icon OpenCVE Enrichment

No data.