First published: Mon Apr 25 2016(Updated: )
Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =3.6.0 | |
Samba | =3.6.1 | |
Samba | =3.6.2 | |
Samba | =3.6.3 | |
Samba | =3.6.4 | |
Samba | =3.6.5 | |
Samba | =3.6.6 | |
Samba | =3.6.7 | |
Samba | =3.6.8 | |
Samba | =3.6.9 | |
Samba | =3.6.10 | |
Samba | =3.6.11 | |
Samba | =3.6.12 | |
Samba | =3.6.13 | |
Samba | =3.6.14 | |
Samba | =3.6.15 | |
Samba | =3.6.16 | |
Samba | =3.6.17 | |
Samba | =3.6.18 | |
Samba | =3.6.19 | |
Samba | =3.6.20 | |
Samba | =3.6.21 | |
Samba | =3.6.22 | |
Samba | =3.6.23 | |
Samba | =3.6.24 | |
Samba | =3.6.25 | |
Samba | =4.0.0 | |
Samba | =4.0.1 | |
Samba | =4.0.2 | |
Samba | =4.0.3 | |
Samba | =4.0.4 | |
Samba | =4.0.5 | |
Samba | =4.0.6 | |
Samba | =4.0.7 | |
Samba | =4.0.8 | |
Samba | =4.0.9 | |
Samba | =4.0.10 | |
Samba | =4.0.11 | |
Samba | =4.0.12 | |
Samba | =4.0.13 | |
Samba | =4.0.14 | |
Samba | =4.0.15 | |
Samba | =4.0.16 | |
Samba | =4.0.17 | |
Samba | =4.0.18 | |
Samba | =4.0.19 | |
Samba | =4.0.20 | |
Samba | =4.0.21 | |
Samba | =4.0.22 | |
Samba | =4.0.23 | |
Samba | =4.0.24 | |
Samba | =4.0.25 | |
Samba | =4.0.26 | |
Samba | =4.1.0 | |
Samba | =4.1.1 | |
Samba | =4.1.2 | |
Samba | =4.1.3 | |
Samba | =4.1.4 | |
Samba | =4.1.5 | |
Samba | =4.1.6 | |
Samba | =4.1.7 | |
Samba | =4.1.8 | |
Samba | =4.1.9 | |
Samba | =4.1.10 | |
Samba | =4.1.11 | |
Samba | =4.1.12 | |
Samba | =4.1.13 | |
Samba | =4.1.14 | |
Samba | =4.1.15 | |
Samba | =4.1.16 | |
Samba | =4.1.17 | |
Samba | =4.1.18 | |
Samba | =4.1.19 | |
Samba | =4.1.20 | |
Samba | =4.1.21 | |
Samba | =4.1.22 | |
Samba | =4.1.23 | |
Samba | =4.2.0-rc1 | |
Samba | =4.2.0-rc2 | |
Samba | =4.2.0-rc3 | |
Samba | =4.2.0-rc4 | |
Samba | =4.2.1 | |
Samba | =4.2.2 | |
Samba | =4.2.3 | |
Samba | =4.2.4 | |
Samba | =4.2.5 | |
Samba | =4.2.6 | |
Samba | =4.2.7 | |
Samba | =4.2.8 | |
Samba | =4.2.9 | |
Samba | =4.3.0 | |
Samba | =4.3.1 | |
Samba | =4.3.2 | |
Samba | =4.3.3 | |
Samba | =4.3.4 | |
Samba | =4.3.5 | |
Samba | =4.3.6 | |
Samba | =4.4.0 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5370 is considered to have a high severity due to its potential for denial of service and arbitrary code execution.
To fix CVE-2015-5370, upgrade Samba to version 4.2.11, 4.3.8, or 4.4.2 or later.
CVE-2015-5370 allows for protocol-downgrade attacks, application crashes, increased CPU consumption, and possibly arbitrary code execution.
CVE-2015-5370 affects Samba versions 3.x and 4.x prior to 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2.
Organizations using vulnerable versions of Samba are at risk of exploitation from remote attackers due to CVE-2015-5370.