SB2022061439 - Multiple vulnerabilities in Microsoft Windows Lightweight Directory Access Protocol (LDAP) 



SB2022061439 - Multiple vulnerabilities in Microsoft Windows Lightweight Directory Access Protocol (LDAP)

Published: June 14, 2022

Security Bulletin ID SB2022061439
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 43% Medium 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2022-30161)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.


2) Input validation error (CVE-ID: CVE-2022-30153)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.


3) Input validation error (CVE-ID: CVE-2022-30149)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.


4) Input validation error (CVE-ID: CVE-2022-30143)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.


5) Input validation error (CVE-ID: CVE-2022-30141)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.


6) Input validation error (CVE-ID: CVE-2022-30146)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.


7) Input validation error (CVE-ID: CVE-2022-30139)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.


Remediation

Install update from vendor's website.