First published: Wed Feb 11 2015(Updated: )
As per upstream samba advisory: All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution vulnerability in the smbd file server daemon. A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Samba | =3.5.0 | |
Samba | =3.5.1 | |
Samba | =3.5.2 | |
Samba | =3.5.3 | |
Samba | =3.5.4 | |
Samba | =3.5.5 | |
Samba | =3.5.6 | |
Samba | =3.5.7 | |
Samba | =3.5.8 | |
Samba | =3.5.9 | |
Samba | =3.5.10 | |
Samba | =3.5.11 | |
Samba | =3.5.12 | |
Samba | =3.5.13 | |
Samba | =3.5.14 | |
Samba | =3.5.15 | |
Samba | =3.5.16 | |
Samba | =3.5.17 | |
Samba | =3.5.18 | |
Samba | =3.5.19 | |
Samba | =3.5.20 | |
Samba | =3.5.21 | |
Samba | =3.5.22 | |
Samba | =3.6.0 | |
Samba | =3.6.1 | |
Samba | =3.6.2 | |
Samba | =3.6.10 | |
Samba | =3.6.11 | |
Samba | =3.6.12 | |
Samba | =3.6.13 | |
Samba | =3.6.14 | |
Samba | =3.6.15 | |
Samba | =3.6.16 | |
Samba | =3.6.17 | |
Samba | =3.6.18 | |
Samba | =3.6.19 | |
Samba | =3.6.20 | |
Samba | =3.6.21 | |
Samba | =3.6.22 | |
Samba | =3.6.23 | |
Samba | =3.6.24 | |
Samba | =4.0.0 | |
Samba | =4.0.1 | |
Samba | =4.0.2 | |
Samba | =4.0.3 | |
Samba | =4.0.4 | |
Samba | =4.0.5 | |
Samba | =4.0.6 | |
Samba | =4.0.7 | |
Samba | =4.0.8 | |
Samba | =4.0.9 | |
Samba | =4.0.10 | |
Samba | =4.0.11 | |
Samba | =4.0.12 | |
Samba | =4.0.13 | |
Samba | =4.0.14 | |
Samba | =4.0.15 | |
Samba | =4.0.16 | |
Samba | =4.0.17 | |
Samba | =4.0.18 | |
Samba | =4.0.19 | |
Samba | =4.0.20 | |
Samba | =4.0.21 | |
Samba | =4.0.22 | |
Samba | =4.0.23 | |
Samba | =4.0.24 | |
Samba | =4.1.0 | |
Samba | =4.1.1 | |
Samba | =4.1.2 | |
Samba | =4.1.3 | |
Samba | =4.1.4 | |
Samba | =4.1.5 | |
Samba | =4.1.6 | |
Samba | =4.1.7 | |
Samba | =4.1.8 | |
Samba | =4.1.9 | |
Samba | =4.1.10 | |
Samba | =4.1.11 | |
Samba | =4.1.12 | |
Samba | =4.1.13 | |
Samba | =4.1.14 | |
Samba | =4.1.15 | |
Samba | =4.1.16 | |
Samba | =4.2.0-rc1 | |
Samba | =4.2.0-rc2 | |
Samba | =4.2.0-rc3 | |
Samba | =4.2.0-rc4 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0240 has a high severity rating due to the potential for remote code execution.
To fix CVE-2015-0240, upgrade Samba to a version that is not vulnerable, specifically any version after 4.2.0-rc4.
CVE-2015-0240 affects all Samba versions from 3.5.0 to 4.2.0-rc4.
Yes, CVE-2015-0240 can be exploited remotely by a malicious client sending crafted packets.
CVE-2015-0240 affects various platforms including Red Hat Enterprise Linux, Ubuntu Linux, and SUSE Linux.