Rapid7 Vulnerability & Exploit Database

Huawei EulerOS: CVE-2020-10730: samba security update

Back to Search

Huawei EulerOS: CVE-2020-10730: samba security update

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
07/07/2020
Created
12/16/2020
Added
12/15/2020
Modified
04/05/2021

Description

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.

Solution(s)

  • huawei-euleros-2_0_sp8-upgrade-ctdb
  • huawei-euleros-2_0_sp8-upgrade-ctdb-tests
  • huawei-euleros-2_0_sp8-upgrade-libsmbclient
  • huawei-euleros-2_0_sp8-upgrade-libwbclient
  • huawei-euleros-2_0_sp8-upgrade-python2-samba
  • huawei-euleros-2_0_sp8-upgrade-python2-samba-test
  • huawei-euleros-2_0_sp8-upgrade-python3-samba
  • huawei-euleros-2_0_sp8-upgrade-python3-samba-test
  • huawei-euleros-2_0_sp8-upgrade-samba
  • huawei-euleros-2_0_sp8-upgrade-samba-client
  • huawei-euleros-2_0_sp8-upgrade-samba-client-libs
  • huawei-euleros-2_0_sp8-upgrade-samba-common
  • huawei-euleros-2_0_sp8-upgrade-samba-common-libs
  • huawei-euleros-2_0_sp8-upgrade-samba-common-tools
  • huawei-euleros-2_0_sp8-upgrade-samba-dc-libs
  • huawei-euleros-2_0_sp8-upgrade-samba-krb5-printing
  • huawei-euleros-2_0_sp8-upgrade-samba-libs
  • huawei-euleros-2_0_sp8-upgrade-samba-pidl
  • huawei-euleros-2_0_sp8-upgrade-samba-test
  • huawei-euleros-2_0_sp8-upgrade-samba-test-libs
  • huawei-euleros-2_0_sp8-upgrade-samba-winbind
  • huawei-euleros-2_0_sp8-upgrade-samba-winbind-clients
  • huawei-euleros-2_0_sp8-upgrade-samba-winbind-krb5-locator
  • huawei-euleros-2_0_sp8-upgrade-samba-winbind-modules

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;