Vulnerability Details : CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
Products affected by CVE-2020-14383
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
Threat overview for CVE-2020-14383
Top countries where our scanners detected CVE-2020-14383
Top open port discovered on systems with this issue
445
IPs affected by CVE-2020-14383 234,987
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-14383!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-14383
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-14383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-14383
-
[PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES AND CONSIDER CWE-252, CWE-248, OR CWE-1069.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2020-14383
-
https://bugzilla.redhat.com/show_bug.cgi?id=1892636
1892636 – (CVE-2020-14383) CVE-2020-14383 samba: An authenticated user can crash the DCE/RPC DNS with easily crafted recordsIssue Tracking;Patch;Third Party Advisory
-
https://www.samba.org/samba/security/CVE-2020-14383.html
Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
[SECURITY] [DLA 3792-1] samba security update
-
https://security.gentoo.org/glsa/202012-24
Samba: Multiple vulnerabilities (GLSA 202012-24) — Gentoo securityThird Party Advisory
Jump to