First published: Fri Dec 04 2015(Updated: )
A denial-of-service vulnerability for the AD-DC due to insuffiecient checking on asn1 memory allocation was reported. Upstream bug: <a href="https://bugzilla.samba.org/show_bug.cgi?id=9187">https://bugzilla.samba.org/show_bug.cgi?id=9187</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.1.22 | 4.1.22 |
redhat/samba | <4.2.0 | 4.2.0 |
Samba | >=4.0.0<4.1.22 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7540 has a severity rating of medium due to its potential for denial-of-service attacks.
To fix CVE-2015-7540, upgrade Samba to version 4.1.22 or 4.2.0 or later.
CVE-2015-7540 affects Samba versions prior to 4.1.22 and 4.2.0, and specific Ubuntu and Debian versions.
CVE-2015-7540 is classified as a denial-of-service vulnerability related to insufficient ASN.1 memory allocation checks.
There are no published workarounds for CVE-2015-7540; the recommended action is to apply the patch or upgrade.