A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202007-15 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704 | issue tracking third party advisory |
https://www.samba.org/samba/security/CVE-2020-10704.html | vendor advisory |