MGASA-2020-0289

Source
https://advisories.mageia.org/MGASA-2020-0289.html
Import Source
https://advisories.mageia.org/MGASA-2020-0289.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0289
Related
Published
2020-07-10T08:01:08Z
Modified
2020-07-10T07:29:24Z
Summary
Updated samba packages fix security vulnerability
Details

Updated samba packages fix security vulnerabilities:

Andrew Bartlett discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2020-10730).

Douglas Bagnall discovered that Samba incorrectly handled certain queries. A remote attacker could possibly use this issue to cause a denial of service (CVE-2020-10745).

Andrei Popa discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2020-10760).

The AD DC NBT server in Samba 4.0 will enter a CPU spin and not process further requests once it receives a empty (zero-length) UDP packet to port 137 (CVE-2020-14303).

References
Credits

Affected packages

Mageia:7 / ldb

Package

Name
ldb
Purl
pkg:rpm/mageia/ldb?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.8-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.17-1.mga7

Ecosystem specific

{
    "section": "core"
}