CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
sambasamba
4.5.0 ≤
𝑥
< 4.10.17
sambasamba
4.11.0 ≤
𝑥
< 4.11.11
sambasamba
4.12.0 ≤
𝑥
< 4.12.4
redhatstorage
3.0
opensuseleap
15.1
opensuseleap
15.2
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ldb
bullseye (security)
2:2.2.3-2~deb11u2
fixed
bullseye
2:2.2.3-2~deb11u2
fixed
stretch
not-affected
buster
postponed
samba
bullseye (security)
2:4.13.13+dfsg-1~deb11u6
fixed
bullseye
2:4.13.13+dfsg-1~deb11u6
fixed
stretch
not-affected
buster
postponed
bookworm
2:4.17.12+dfsg-0+deb12u1
fixed
bookworm (security)
2:4.17.12+dfsg-0+deb12u1
fixed
sid
2:4.21.1+dfsg-2
fixed
trixie
2:4.21.1+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
samba
focal
Fixed 2:4.11.6+dfsg-0ubuntu1.3
released
eoan
Fixed 2:4.10.7+dfsg-0ubuntu2.6
released
bionic
Fixed 2:4.7.6+dfsg~ubuntu-0ubuntu2.17
released
xenial
not-affected
trusty
not-affected