CVE Vulnerabilities

CVE-2020-14323

Improper Null Termination

Published: Oct 29, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A null pointer dereference flaw was found in sambas Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.

Weakness

The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.

Affected Software

Name Vendor Start Version End Version
Samba Samba 3.6.0 (including) 4.11.15 (excluding)
Samba Samba 4.12.0 (including) 4.12.9 (excluding)
Samba Samba 4.13.0 (including) 4.13.1 (excluding)
Red Hat Enterprise Linux 7 RedHat samba-0:4.10.16-9.el7_9 *
Red Hat Enterprise Linux 8 RedHat openchange-0:2.3-27.el8 *
Red Hat Enterprise Linux 8 RedHat samba-0:4.13.3-3.el8 *
Red Hat Enterprise Linux 8 RedHat openchange-0:2.3-27.el8 *
Red Hat Enterprise Linux 8 RedHat samba-0:4.13.3-3.el8 *
Red Hat Gluster Storage 3.5 for RHEL 7 RedHat samba-0:4.11.6-112.el7rhgs *
Red Hat Gluster Storage 3.5 for RHEL 8 RedHat samba-0:4.13.7-101.el8rhgs *
Samba Ubuntu bionic *
Samba Ubuntu devel *
Samba Ubuntu focal *
Samba Ubuntu groovy *
Samba Ubuntu hirsute *
Samba Ubuntu precise/esm *
Samba Ubuntu trusty *
Samba Ubuntu trusty/esm *
Samba Ubuntu upstream *
Samba Ubuntu xenial *

Potential Mitigations

References