A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2463-1 | samba security update |
Debian DSA |
DSA-4884-1 | ldb security update |
EUVD |
EUVD-2020-3155 | A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-4409-1 | Samba vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.217Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10730
No data.
Status : Modified
Published: 2020-07-07T14:15:10.927
Modified: 2024-11-21T04:55:56.987
Link: CVE-2020-10730
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN