Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0240

Опубликовано: 24 фев. 2015
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 10

Описание

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

РелизСтатусПримечание
devel

released

2:4.1.13+dfsg-4ubuntu2
esm-infra-legacy/trusty

released

2:4.1.6+dfsg-1ubuntu2.14.04.7
esm-infra/xenial

released

2:4.1.13+dfsg-4ubuntu2
lucid

not-affected

2:3.4.7~dfsg-1ubuntu3.15
precise

released

2:3.6.3-2ubuntu2.12
precise/esm

not-affected

2:3.6.3-2ubuntu2.12
trusty

released

2:4.1.6+dfsg-1ubuntu2.14.04.7
trusty/esm

released

2:4.1.6+dfsg-1ubuntu2.14.04.7
upstream

released

4.1.17,3.6.25
utopic

released

2:4.1.11+dfsg-1ubuntu2.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 100%
0.92168
Критический

10 Critical

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

nvd
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

debian
больше 10 лет назад

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x be ...

suse-cvrf
больше 10 лет назад

Security update for Samba

suse-cvrf
больше 10 лет назад

Security update for samba

EPSS

Процентиль: 100%
0.92168
Критический

10 Critical

CVSS2