Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-0240

Опубликовано: 23 фев. 2015
Источник: redhat
CVSS2: 7.9
EPSS Критический

Описание

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user).

Отчет

This issue does not affect the version of samba package as shipped with Red Hat Enterprise Linux 4 and 5. It does affect the version of samba as shipped with Red Hat Enterprise Linux 6 and 7, as well as the version of samba3x shipped with Red Hat Enterprise Linux 5 and the version of samba4 as shipped with Red Hat Enterprise Linux 6. Red Hat Product Security has determined that this vulnerability has Important impact on Red Hat Enterprise Linux 7 because the Samba version shipped in this version of the operating system only executes the vulnerable code after a memory allocation failure, making it more difficult to exploit this flaw.

Меры по смягчению последствий

On Samba versions 4.0.0 and above, add the line: rpc_server:netlogon=disabled to the [global] section of your smb.conf. For Samba versions 3.6.x and earlier, this workaround is not available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4sambaNot affected
Red Hat Enterprise Linux 5sambaNot affected
Red Hat Enterprise Linux Extended Update Support 5.6samba3xAffected
Red Hat Enterprise Linux Extended Update Support 6.2samba4Not affected
Red Hat Enterprise Linux 5samba3xFixedRHSA-2015:024923.02.2015
Red Hat Enterprise Linux 5.6 Long Lifesamba3xFixedRHSA-2015:025323.02.2015
Red Hat Enterprise Linux 5.9 Extended Update Supportsamba3xFixedRHSA-2015:025323.02.2015
Red Hat Enterprise Linux 6samba4FixedRHSA-2015:025023.02.2015
Red Hat Enterprise Linux 6sambaFixedRHSA-2015:025123.02.2015
Red Hat Enterprise Linux 6.2 Advanced Update SupportsambaFixedRHSA-2015:025423.02.2015

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1191325samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution

EPSS

Процентиль: 100%
0.92168
Критический

7.9 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

nvd
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

debian
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ...

suse-cvrf
больше 10 лет назад

Security update for Samba

suse-cvrf
больше 10 лет назад

Security update for samba

EPSS

Процентиль: 100%
0.92168
Критический

7.9 High

CVSS2

Уязвимость CVE-2015-0240