A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.netapp.com/advisory/ntap-20210326-0007/ | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html | third party advisory mailing list |
https://www.debian.org/security/2021/dsa-4884 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1941400 | issue tracking third party advisory |
https://www.samba.org/samba/security/CVE-2020-27840.html | vendor advisory |
https://security.gentoo.org/glsa/202105-22 | third party advisory vendor advisory |