{"id":"CVE-2022-32742","details":"A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).","modified":"2026-03-14T14:50:37.431303Z","published":"2022-08-25T18:15:10.430Z","related":["ALSA-2022:7111","ALSA-2022:8317","MGASA-2022-0299","SUSE-SU-2022:2580-1","SUSE-SU-2022:2582-1","SUSE-SU-2022:2585-1","SUSE-SU-2022:2586-1","SUSE-SU-2022:2586-2","SUSE-SU-2022:2598-1","SUSE-SU-2022:2621-1","SUSE-SU-2022:2651-1","SUSE-SU-2022:2659-1","SUSE-SU-2022:4395-1","SUSE-SU-2023:0081-1","SUSE-SU-2023:0122-1","SUSE-SU-2023:0160-1","openSUSE-SU-2024:12243-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-06"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2022-32742.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"0"},{"fixed":"ad06fd8294503b6a27729118dd8c80558d41924a"},{"introduced":"fc8342bd26d1c55ca5780b427f675f31147b27f9"},{"fixed":"c8fc01ca36445e87c3e503026a446416d66cd1bf"},{"introduced":"e95d85f784ae6b19f2cb42cc9039b60b146e5b69"},{"fixed":"9618af1b66aa7503e02b25c9a0bb5b1f31baffbc"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.14.14"},{"introduced":"4.15.0"},{"fixed":"4.15.9"},{"introduced":"4.16.0"},{"fixed":"4.16.4"}]}}],"versions":["ldb-2.4.1","ldb-2.4.2","ldb-2.4.3","ldb-2.4.4","ldb-2.5.1","ldb-2.5.2","samba-4.15.0","samba-4.15.1","samba-4.15.2","samba-4.15.3","samba-4.15.4","samba-4.15.5","samba-4.15.6","samba-4.15.7","samba-4.15.8","samba-4.16.0","samba-4.16.1","samba-4.16.2","samba-4.16.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32742.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}