First published: Mon Jun 22 2020(Updated: )
A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.5.0<4.10.17 | |
Samba Samba | >=4.11.0<4.11.11 | |
Samba Samba | >=4.12.0<4.12.4 | |
Redhat Storage | =3.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/samba | <2:4.11.6+dfsg-0ubuntu1.3 | 2:4.11.6+dfsg-0ubuntu1.3 |
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.17 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.17 |
ubuntu/samba | <2:4.10.7+dfsg-0ubuntu2.6 | 2:4.10.7+dfsg-0ubuntu2.6 |
ubuntu/samba | <4.10.17<4.11.10<4.12.4 | 4.10.17 4.11.10 4.12.4 |
redhat/samba | <4.10.17 | 4.10.17 |
redhat/samba | <4.11.11 | 4.11.11 |
redhat/samba | <4.12.4 | 4.12.4 |
debian/ldb | 2:1.5.1+really1.4.6-3+deb10u1 2:2.2.3-2~deb11u2 | |
debian/samba | <=2:4.9.5+dfsg-5+deb10u3<=2:4.9.5+dfsg-5+deb10u4 | 2:4.13.13+dfsg-1~deb11u5 2:4.17.12+dfsg-0+deb12u1 2:4.19.4+dfsg-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-10730.
The severity of CVE-2020-10730 is medium with a severity value of 6.5.
Versions before 4.10.17, before 4.11.11, and before 4.12.4 of Samba are affected by CVE-2020-10730.
Operating systems such as Red Hat Enterprise Linux, Ubuntu, openSUSE Leap, Fedora, and Debian Debian Linux are affected by CVE-2020-10730.
You can find more information about CVE-2020-10730 at the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html), [Link 3](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html).