Vulnerability Details : CVE-2020-10745
A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
Vulnerability category: Denial of service
Products affected by CVE-2020-10745
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Threat overview for CVE-2020-10745
Top countries where our scanners detected CVE-2020-10745
Top open port discovered on systems with this issue
445
IPs affected by CVE-2020-10745 212,720
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-10745!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-10745
3.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10745
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-10745
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-10745
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html
[security-announce] openSUSE-SU-2020:1023-1: important: Security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
[SECURITY] Fedora 31 Update: libldb-2.0.12-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.samba.org/samba/security/CVE-2020-10745.html
Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
[SECURITY] [DLA 2463-1] samba security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html
[security-announce] openSUSE-SU-2020:1313-1: important: Security updateMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1849491;
1849491 – (CVE-2020-10745) CVE-2020-10745 samba: Parsing and packing of NBT and DNS packets can consume excessive CPUIssue Tracking;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/202007-15
Samba: Multiple vulnerabilities (GLSA 202007-15) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html
[security-announce] openSUSE-SU-2020:0984-1: important: Security updateMailing List;Third Party Advisory
Jump to