Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-0240

Published: 23 February 2015

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Priority

Medium

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(2:3.4.7~dfsg-1ubuntu3.15)
precise
Released (2:3.6.3-2ubuntu2.12)
trusty
Released (2:4.1.6+dfsg-1ubuntu2.14.04.7)
upstream
Released (4.1.17,3.6.25)
utopic
Released (2:4.1.11+dfsg-1ubuntu2.2)
vivid
Released (2:4.1.13+dfsg-4ubuntu2)
wily
Released (2:4.1.13+dfsg-4ubuntu2)
xenial
Released (2:4.1.13+dfsg-4ubuntu2)
yakkety
Released (2:4.1.13+dfsg-4ubuntu2)
zesty
Released (2:4.1.13+dfsg-4ubuntu2)
Patches:
upstream: https://www.samba.org/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch
upstream: https://www.samba.org/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch
upstream: https://www.samba.org/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch
samba4
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise Ignored
(end of life)
trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist