Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-14383 CVE-2020-14323 CVE-2020-14318 |
CWE-ID | CWE-119 CWE-476 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system samba-vfs-glusterfs Operating systems & Components / Operating system package or component samba-help Operating systems & Components / Operating system package or component samba-winbind-clients Operating systems & Components / Operating system package or component samba-dc-bind-dlz Operating systems & Components / Operating system package or component samba-winbind Operating systems & Components / Operating system package or component samba-devel Operating systems & Components / Operating system package or component samba-common Operating systems & Components / Operating system package or component samba-client Operating systems & Components / Operating system package or component samba-dc-provision Operating systems & Components / Operating system package or component libsmbclient Operating systems & Components / Operating system package or component libwbclient-devel Operating systems & Components / Operating system package or component samba-winbind-modules Operating systems & Components / Operating system package or component samba-common-tools Operating systems & Components / Operating system package or component ctdb-tests Operating systems & Components / Operating system package or component samba-debugsource Operating systems & Components / Operating system package or component samba-pidl Operating systems & Components / Operating system package or component python3-samba Operating systems & Components / Operating system package or component samba-test Operating systems & Components / Operating system package or component samba-debuginfo Operating systems & Components / Operating system package or component samba-krb5-printing Operating systems & Components / Operating system package or component ctdb Operating systems & Components / Operating system package or component samba-libs Operating systems & Components / Operating system package or component samba-dc Operating systems & Components / Operating system package or component libwbclient Operating systems & Components / Operating system package or component libsmbclient-devel Operating systems & Components / Operating system package or component python3-samba-test Operating systems & Components / Operating system package or component samba-winbind-krb5-locator Operating systems & Components / Operating system package or component python3-samba-dc Operating systems & Components / Operating system package or component samba Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU47993
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-14383
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing DNS records. A remote user
with ability to create MX or NS records with absent properties can trigger the RPC service to dereference uninitialized memory and will result in denial of service attack against the RPC service.Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
samba-vfs-glusterfs: before 4.11.12-3
samba-help: before 4.11.12-3
samba-winbind-clients: before 4.11.12-3
samba-dc-bind-dlz: before 4.11.12-3
samba-winbind: before 4.11.12-3
samba-devel: before 4.11.12-3
samba-common: before 4.11.12-3
samba-client: before 4.11.12-3
samba-dc-provision: before 4.11.12-3
libsmbclient: before 4.11.12-3
libwbclient-devel: before 4.11.12-3
samba-winbind-modules: before 4.11.12-3
samba-common-tools: before 4.11.12-3
ctdb-tests: before 4.11.12-3
samba-debugsource: before 4.11.12-3
samba-pidl: before 4.11.12-3
python3-samba: before 4.11.12-3
samba-test: before 4.11.12-3
samba-debuginfo: before 4.11.12-3
samba-krb5-printing: before 4.11.12-3
ctdb: before 4.11.12-3
samba-libs: before 4.11.12-3
samba-dc: before 4.11.12-3
libwbclient: before 4.11.12-3
libsmbclient-devel: before 4.11.12-3
python3-samba-test: before 4.11.12-3
samba-winbind-krb5-locator: before 4.11.12-3
python3-samba-dc: before 4.11.12-3
samba: before 4.11.12-3
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1121
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU47991
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-14323
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error when processing requests in winbind in Samba. A remote user can send specially crafted request to winbind daemon, trigger a NULL pointer dereference error and crash it.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
samba-vfs-glusterfs: before 4.11.12-3
samba-help: before 4.11.12-3
samba-winbind-clients: before 4.11.12-3
samba-dc-bind-dlz: before 4.11.12-3
samba-winbind: before 4.11.12-3
samba-devel: before 4.11.12-3
samba-common: before 4.11.12-3
samba-client: before 4.11.12-3
samba-dc-provision: before 4.11.12-3
libsmbclient: before 4.11.12-3
libwbclient-devel: before 4.11.12-3
samba-winbind-modules: before 4.11.12-3
samba-common-tools: before 4.11.12-3
ctdb-tests: before 4.11.12-3
samba-debugsource: before 4.11.12-3
samba-pidl: before 4.11.12-3
python3-samba: before 4.11.12-3
samba-test: before 4.11.12-3
samba-debuginfo: before 4.11.12-3
samba-krb5-printing: before 4.11.12-3
ctdb: before 4.11.12-3
samba-libs: before 4.11.12-3
samba-dc: before 4.11.12-3
libwbclient: before 4.11.12-3
libsmbclient-devel: before 4.11.12-3
python3-samba-test: before 4.11.12-3
samba-winbind-krb5-locator: before 4.11.12-3
python3-samba-dc: before 4.11.12-3
samba: before 4.11.12-3
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1121
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU47990
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-14318
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to the way "ChangeNotify" concept for SMB1/2/3 protocols was implemented in Samba. A missing permissions check on a directory handle requesting ChangeNotify means that a client with a directory handle open only for FILE_READ_ATTRIBUTES (minimal access rights) could be used to obtain change notify replies from the server. These replies contain information that should not be available to directory handles open for FILE_READ_ATTRIBUTE only. A local unprivileged user can abuse this lack of permissions check to obtain information about file changes.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
samba-vfs-glusterfs: before 4.11.12-3
samba-help: before 4.11.12-3
samba-winbind-clients: before 4.11.12-3
samba-dc-bind-dlz: before 4.11.12-3
samba-winbind: before 4.11.12-3
samba-devel: before 4.11.12-3
samba-common: before 4.11.12-3
samba-client: before 4.11.12-3
samba-dc-provision: before 4.11.12-3
libsmbclient: before 4.11.12-3
libwbclient-devel: before 4.11.12-3
samba-winbind-modules: before 4.11.12-3
samba-common-tools: before 4.11.12-3
ctdb-tests: before 4.11.12-3
samba-debugsource: before 4.11.12-3
samba-pidl: before 4.11.12-3
python3-samba: before 4.11.12-3
samba-test: before 4.11.12-3
samba-debuginfo: before 4.11.12-3
samba-krb5-printing: before 4.11.12-3
ctdb: before 4.11.12-3
samba-libs: before 4.11.12-3
samba-dc: before 4.11.12-3
libwbclient: before 4.11.12-3
libsmbclient-devel: before 4.11.12-3
python3-samba-test: before 4.11.12-3
samba-winbind-krb5-locator: before 4.11.12-3
python3-samba-dc: before 4.11.12-3
samba: before 4.11.12-3
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1121
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.