CVE-2020-27840
high-risk
Published 2021-05-12
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
Do I need to act?
!
14.5% chance of exploitation in next 30 days
EPSS score — higher than 85% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (6)
Affected Vendors
References (18)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1941400
Third Party Advisory
https://security.gentoo.org/glsa/202105-22
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0007/
Third Party Advisory
https://www.debian.org/security/2021/dsa-4884
Vendor Advisory
https://www.samba.org/samba/security/CVE-2020-27840.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1941400
Third Party Advisory
https://security.gentoo.org/glsa/202105-22
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0007/
Third Party Advisory
https://www.debian.org/security/2021/dsa-4884
Vendor Advisory
https://www.samba.org/samba/security/CVE-2020-27840.html
51
/ 100
high-risk
Severity
26/34 · High
Exploitability
12/34 · Low
Exposure
13/34 · Low