Sales Chat - Click Here

CPU and use-after-free DoS vulnerabilities in Samba AD DC


Jun 23, 2023

Users of a Samba server configured as an Active Directory domain controller affected by CPU and use-after-free DoS vulnerabilities

Summary

This vulnerability applies to functionality when the system is acting as an Active Directory domain controller. No Buffalo NAS products use this functionality, and so no Buffalo sytems are affected by this vulnerability.

Vulnerability ID Vulnerability Overview
CVE-2020-10730 A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
CVE-2020-10745 A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
CVE-2020-10760 A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.
CVE-2020-14303 A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash..

Affected Supported TeraStations

None

Back to Security Notices

Date Description
6/23/2022 Initial release
X