First published: Wed Feb 11 2015(Updated: )
As per upstream samba advisory: All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution vulnerability in the smbd file server daemon. A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Samba Samba | =3.5.0 | |
Samba Samba | =3.5.1 | |
Samba Samba | =3.5.2 | |
Samba Samba | =3.5.3 | |
Samba Samba | =3.5.4 | |
Samba Samba | =3.5.5 | |
Samba Samba | =3.5.6 | |
Samba Samba | =3.5.7 | |
Samba Samba | =3.5.8 | |
Samba Samba | =3.5.9 | |
Samba Samba | =3.5.10 | |
Samba Samba | =3.5.11 | |
Samba Samba | =3.5.12 | |
Samba Samba | =3.5.13 | |
Samba Samba | =3.5.14 | |
Samba Samba | =3.5.15 | |
Samba Samba | =3.5.16 | |
Samba Samba | =3.5.17 | |
Samba Samba | =3.5.18 | |
Samba Samba | =3.5.19 | |
Samba Samba | =3.5.20 | |
Samba Samba | =3.5.21 | |
Samba Samba | =3.5.22 | |
Samba Samba | =3.6.0 | |
Samba Samba | =3.6.1 | |
Samba Samba | =3.6.2 | |
Samba Samba | =3.6.10 | |
Samba Samba | =3.6.11 | |
Samba Samba | =3.6.12 | |
Samba Samba | =3.6.13 | |
Samba Samba | =3.6.14 | |
Samba Samba | =3.6.15 | |
Samba Samba | =3.6.16 | |
Samba Samba | =3.6.17 | |
Samba Samba | =3.6.18 | |
Samba Samba | =3.6.19 | |
Samba Samba | =3.6.20 | |
Samba Samba | =3.6.21 | |
Samba Samba | =3.6.22 | |
Samba Samba | =3.6.23 | |
Samba Samba | =3.6.24 | |
Samba Samba | =4.0.0 | |
Samba Samba | =4.0.1 | |
Samba Samba | =4.0.2 | |
Samba Samba | =4.0.3 | |
Samba Samba | =4.0.4 | |
Samba Samba | =4.0.5 | |
Samba Samba | =4.0.6 | |
Samba Samba | =4.0.7 | |
Samba Samba | =4.0.8 | |
Samba Samba | =4.0.9 | |
Samba Samba | =4.0.10 | |
Samba Samba | =4.0.11 | |
Samba Samba | =4.0.12 | |
Samba Samba | =4.0.13 | |
Samba Samba | =4.0.14 | |
Samba Samba | =4.0.15 | |
Samba Samba | =4.0.16 | |
Samba Samba | =4.0.17 | |
Samba Samba | =4.0.18 | |
Samba Samba | =4.0.19 | |
Samba Samba | =4.0.20 | |
Samba Samba | =4.0.21 | |
Samba Samba | =4.0.22 | |
Samba Samba | =4.0.23 | |
Samba Samba | =4.0.24 | |
Samba Samba | =4.1.0 | |
Samba Samba | =4.1.1 | |
Samba Samba | =4.1.2 | |
Samba Samba | =4.1.3 | |
Samba Samba | =4.1.4 | |
Samba Samba | =4.1.5 | |
Samba Samba | =4.1.6 | |
Samba Samba | =4.1.7 | |
Samba Samba | =4.1.8 | |
Samba Samba | =4.1.9 | |
Samba Samba | =4.1.10 | |
Samba Samba | =4.1.11 | |
Samba Samba | =4.1.12 | |
Samba Samba | =4.1.13 | |
Samba Samba | =4.1.14 | |
Samba Samba | =4.1.15 | |
Samba Samba | =4.1.16 | |
Samba Samba | =4.2.0-rc1 | |
Samba Samba | =4.2.0-rc2 | |
Samba Samba | =4.2.0-rc3 | |
Samba Samba | =4.2.0-rc4 | |
Novell Suse Linux Enterprise Desktop | =12 | |
Novell Suse Linux Enterprise Server | =12 | |
Novell Suse Linux Enterprise Software Development Kit | =12 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.