Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2015-0240
HistoryFeb 24, 2015 - 1:59 a.m.

CVE-2015-0240

2015-02-2401:59:00
Debian Security Bug Tracker
security-tracker.debian.org
34

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.974

Percentile

99.9%

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba<Β 2:4.1.17+dfsg-1samba_2:4.1.17+dfsg-1_all.deb
Debian11allsamba<Β 2:4.1.17+dfsg-1samba_2:4.1.17+dfsg-1_all.deb
Debian999allsamba<Β 2:4.1.17+dfsg-1samba_2:4.1.17+dfsg-1_all.deb
Debian13allsamba<Β 2:4.1.17+dfsg-1samba_2:4.1.17+dfsg-1_all.deb

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.974

Percentile

99.9%