CVE Vulnerabilities

CVE-2020-14323

NULL Pointer Dereference

Published: Oct 29, 2020 | Modified: Jul 03, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A null pointer dereference flaw was found in sambas Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Samba Samba 3.6.0 (including) 4.11.15 (excluding)
Samba Samba 4.12.0 (including) 4.12.9 (excluding)
Samba Samba 4.13.0 (including) 4.13.1 (excluding)
Red Hat Enterprise Linux 7 RedHat samba-0:4.10.16-9.el7_9 *
Red Hat Enterprise Linux 8 RedHat openchange-0:2.3-27.el8 *
Red Hat Enterprise Linux 8 RedHat samba-0:4.13.3-3.el8 *
Red Hat Enterprise Linux 8 RedHat openchange-0:2.3-27.el8 *
Red Hat Enterprise Linux 8 RedHat samba-0:4.13.3-3.el8 *
Red Hat Gluster Storage 3.5 for RHEL 7 RedHat samba-0:4.11.6-112.el7rhgs *
Red Hat Gluster Storage 3.5 for RHEL 8 RedHat samba-0:4.13.7-101.el8rhgs *
Samba Ubuntu bionic *
Samba Ubuntu devel *
Samba Ubuntu focal *
Samba Ubuntu groovy *
Samba Ubuntu hirsute *
Samba Ubuntu precise/esm *
Samba Ubuntu trusty *
Samba Ubuntu trusty/esm *
Samba Ubuntu upstream *
Samba Ubuntu xenial *

Potential Mitigations

References