A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1892636 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html | |
https://security.gentoo.org/glsa/202012-24 | Third Party Advisory |
https://www.samba.org/samba/security/CVE-2020-14383.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2020-12-02T00:00:00
Updated: 2024-04-22T16:05:57.710729
Reserved: 2020-06-17T00:00:00
Link: CVE-2020-14383
JSON object: View
NVD Information
Status : Modified
Published: 2020-12-02T01:15:12.170
Modified: 2024-04-22T16:15:11.937
Link: CVE-2020-14383
JSON object: View
Redhat Information
No data.
CWE