Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-AE599263-BCA2-11EA-B78F-B42E99A1B9C3:
The Samba Team reports:
Four vulnerabilities were fixed in samba:
CVE-2020-10730: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
CVE-2020-10745: Parsing and packing of NBT and DNS packets can consume excessive CPU in the AD DC (only)
CVE-2020-10760: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
CVE-2020-14303: Empty UDP packet DoS in Samba AD DC nbtd
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center