First published: Wed May 06 2020(Updated: )
A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.0.0<4.10.15 | |
Samba | >=4.11.0<4.11.8 | |
Samba | >=4.12.0<4.12.2 | |
Fedora | =30 | |
Fedora | =31 | |
openSUSE | =15.2 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10704 has a severity rating that indicates a high risk for denial of service due to a stack overflow vulnerability.
To fix CVE-2020-10704, you should upgrade your Samba installation to a version that is not affected, such as Samba 4.10.15 or later.
CVE-2020-10704 affects various versions of Samba along with specific Fedora and openSUSE releases.
CVE-2020-10704 allows an unauthorized user to cause a stack overflow, potentially leading to a denial of service attack.
There are no known effective workarounds for CVE-2020-10704, and upgrading the software is the recommended approach to mitigate the vulnerability.