5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:N/I:N/A:P
samba is vulnerable to denial of service (DoS). The vulnerability exists as a use-after-free flaw was found in the way samba AD DC LDAP servers, handled ‘Paged Results’ control is combined with the ‘ASQ’ control.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700
lists.fedoraproject.org/archives/list/[email protected]/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/
lists.fedoraproject.org/archives/list/[email protected]/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/
lists.fedoraproject.org/archives/list/[email protected]/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/
security.gentoo.org/glsa/202007-15
www.samba.org/samba/security/CVE-2020-10700.html
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:N/I:N/A:P