CVE-2015-0240
Published: 23 February 2015
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(2:3.4.7~dfsg-1ubuntu3.15)
|
precise |
Released
(2:3.6.3-2ubuntu2.12)
|
|
trusty |
Released
(2:4.1.6+dfsg-1ubuntu2.14.04.7)
|
|
upstream |
Released
(4.1.17,3.6.25)
|
|
utopic |
Released
(2:4.1.11+dfsg-1ubuntu2.2)
|
|
vivid |
Released
(2:4.1.13+dfsg-4ubuntu2)
|
|
wily |
Released
(2:4.1.13+dfsg-4ubuntu2)
|
|
xenial |
Released
(2:4.1.13+dfsg-4ubuntu2)
|
|
yakkety |
Released
(2:4.1.13+dfsg-4ubuntu2)
|
|
zesty |
Released
(2:4.1.13+dfsg-4ubuntu2)
|
|
Patches: upstream: https://www.samba.org/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch upstream: https://www.samba.org/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch upstream: https://www.samba.org/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch |
||
samba4 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|