Samba vulnerability, leading to overflow of buffer

published Correcting issues of the package samba 4.17.3, 4.16.7 and 4.15.12 with elimination vulnerabilities ( cve-2022-42898 ) in Heimdal and Mit Kerberos libraries leading to integer overflow and data recording outside the selected buffer during the processing of PAC (Privileged Attribute Certificate). Publication of packet updates in distributions can be traced on the pages: debian , ubuntu , gentoo , rheel , SUSE , arch , freeBSD .

Operation of vulnerability is possible only on 32-bit systems. The problem affects the configuration with KDC (Key Distribution Centeror) or Kadmind. In configurations without Active Directory, vulnerability is also manifested on file servers using Kerberos. The problem is caused by an error in the KRB5_PARSE_PAC () function, due to which the size of the buffer used to analyze the PAC fields was incorrectly calculated. On 32-bit systems, when processing specially designed PAC, an error could lead to the placement of a 16-byte block, transferred by the attackers outside the highlighted buffer.

/Media reports.