#VU33830 Input validation error in Samba - CVE-2015-0240

 

#VU33830 Input validation error in Samba - CVE-2015-0240

Published: February 24, 2015 / Updated: November 20, 2020


Vulnerability identifier: #VU33830
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2015-0240
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
Samba
Software vendor:
Samba

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.


Remediation

Install update from vendor's website.

External links