CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html Issue Tracking Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
https://security.gentoo.org/glsa/202007-15 Third Party Advisory
https://www.debian.org/security/2021/dsa-4884 Third Party Advisory
https://www.samba.org/samba/security/CVE-2020-10730.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html Issue Tracking Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
https://security.gentoo.org/glsa/202007-15 Third Party Advisory
https://www.debian.org/security/2021/dsa-4884 Third Party Advisory
https://www.samba.org/samba/security/CVE-2020-10730.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-07-07 14:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10730

Mitre link : CVE-2020-10730

CVE.ORG link : CVE-2020-10730


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

redhat

  • storage

samba

  • samba

opensuse

  • leap
CWE
CWE-416

Use After Free

CWE-476

NULL Pointer Dereference