Information Exposure Affecting samba package, versions [,4.11.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.98% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SAMBA-2961662
  • published28 Jul 2022
  • disclosed27 Jul 2022
  • creditLuca Moro

Introduced: 27 Jul 2022

CVE-2022-32742  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade samba to version 4.11.0 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).

Note: Samba versions 4.11.0 and above disable SMB1 by default, and will only be vulnerable if the administrator has deliberately enabled SMB1 in the smb.conf file.

CVSS Scores

version 3.1