CVE-2020-10745

Source
https://cve.org/CVERecord?id=CVE-2020-10745
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10745.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-10745
Downstream
Related
Published
2020-07-07T14:15:11.007Z
Modified
2026-02-04T05:10:21.474619Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

References

Affected packages

Git / github.com/samba-team/samba

Affected versions

ldb-2.*
ldb-2.0.10
ldb-2.0.11
ldb-2.0.12
ldb-2.0.8
ldb-2.0.9
ldb-2.1.2
ldb-2.1.3
ldb-2.1.4
samba-4.*
samba-4.11.0
samba-4.11.1
samba-4.11.10
samba-4.11.2
samba-4.11.3
samba-4.11.4
samba-4.11.5
samba-4.11.6
samba-4.11.7
samba-4.11.8
samba-4.11.9
samba-4.12.0
samba-4.12.1
samba-4.12.2
samba-4.12.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10745.json"