7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.451 Medium
EPSS
Percentile
97.4%
Software: samba 4.10.16
OS: Cobalt 7.9
CVE-ID: CVE-2020-10745
CVE-Crit: HIGH
CVE-DESC: In all versions of Samba prior to 4.10.17, prior to 4.11.11, and prior to 4.12.4, a flaw has been discovered in the way NetBios is handled over TCP / IP. This flaw allows a remote attacker to cause excessive CPU utilization by the Samba server, resulting in a denial of service. The biggest threat to this vulnerability is system availability.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-10760
CVE-Crit: MEDIUM
CVE-DESC: A post-release usage error was detected in all versions of Samba LDAP servers prior to 4.10.17, prior to 4.11.11, prior to 4.12.4 used in the AC DC configuration. A Samba LDAP user could exploit this vulnerability to crash Samba.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-10730
CVE-Crit: MEDIUM
CVE-DESC: null pointer dereference or possible use error after releasing the Samba AD LDAP server in versions prior to 4.10.17, prior to 4.11.11, and prior to 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the vulnerable code is shipped with the libldb package. This flaw allows an authenticated user to initiate dereferencing of a use-after-free or NULL pointer. The biggest threat from this vulnerability is to system availability.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-14303
CVE-Crit: HIGH
CVE-DESC: A bug was detected in the AD DC NBT server in all versions of Samba before 4.10.17, before 4.11.11, and before 4.12.4. A Samba user can send an empty UDP packet to cause the Samba server to crash.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-14318
CVE-Crit: MEDIUM
CVE-DESC: A bug has been discovered in the way samba handles file and directory permissions. An authenticated user could exploit this vulnerability to gain access to certain file and directory information that would otherwise be inaccessible to an attacker.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-14383
CVE-Crit: MEDIUM
CVE-DESC: an error has been detected in the samba DNS server. An authenticated user can use this flaw on the RPC server to fail. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but an unauthorized authenticated attacker could bring it down again as soon as it returns. The Samba DNS server itself will continue to run, but many RPC services will not.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-1472
CVE-Crit: CRITICAL
CVE-DESC: A privilege escalation vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller using the Netlogon Remote Protocol (MS-NRPC), also known as the “Netlogon Elevation of Privilege Vulnerability”.
CVE-STATUS: Default
CVE-REV: Default
CVE-ID: CVE-2021-20208
CVE-Crit: MEDIUM
CVE-DESC: a bug was found in cifs-utils in versions before 6.13. A user can use host Kerberos credentials when mounting a krb5 CIFS file system from a container. The biggest threat from this vulnerability is to data confidentiality and integrity.
CVE-STATUS: default
CVE-REV: Default
CVE-ID: CVE-2021-20254
CVE-Crit: HIGH
CVE-DESC: an error has been detected in samba. The Samba smbd file server should map Windows group identifiers (SIDs) to unix group identifiers (gids). The code performing this had a flaw that could allow it to read data beyond the end of the array when a negative cache entry was added to the mapping cache. This could cause the calling code to return these values to the process token that stores the group membership for the user. The biggest threat from this vulnerability is to data confidentiality and integrity.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2021-20277
CVE-Crit: HIGH
CVE-DESC: An error was detected in libldb Samba. Multiple consecutive leading spaces in an LDAP attribute could result in an out-of-memory write, causing the LDAP server process handling the request to crash. The biggest threat from this vulnerability is to system availability.
CVE-STATUS: default
CVE-REV: Default
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.451 Medium
EPSS
Percentile
97.4%