The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x prior to 3.6.25, 4.0.x prior to 4.0.25, 4.1.x prior to 4.1.17, and 4.2.x prior to 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote malicious users to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat enterprise linux 7.0 |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux 5 |
||
samba samba 4.1.9 |
||
samba samba 3.6.24 |
||
samba samba 4.0.14 |
||
samba samba 3.6.17 |
||
samba samba 4.0.24 |
||
samba samba 3.5.1 |
||
samba samba 4.1.16 |
||
samba samba 4.1.12 |
||
samba samba 4.0.2 |
||
samba samba 4.2.0 |
||
samba samba 3.5.9 |
||
samba samba 4.1.14 |
||
samba samba 3.6.10 |
||
samba samba 3.5.7 |
||
samba samba 4.0.22 |
||
samba samba 4.0.11 |
||
samba samba 4.1.7 |
||
samba samba 4.0.3 |
||
samba samba 3.5.11 |
||
samba samba 4.0.21 |
||
samba samba 4.0.16 |
||
samba samba 4.1.8 |
||
samba samba 3.6.23 |
||
samba samba 4.0.13 |
||
samba samba 4.1.5 |
||
samba samba 4.1.6 |
||
samba samba 4.0.17 |
||
samba samba 3.5.6 |
||
samba samba 4.0.6 |
||
samba samba 4.0.19 |
||
samba samba 3.6.11 |
||
samba samba 3.6.19 |
||
samba samba 3.6.16 |
||
samba samba 3.5.19 |
||
samba samba 4.1.11 |
||
samba samba 3.5.8 |
||
samba samba 3.6.1 |
||
samba samba 3.6.2 |
||
samba samba 3.5.17 |
||
samba samba 3.5.2 |
||
samba samba 4.0.10 |
||
samba samba 3.6.12 |
||
samba samba 4.1.4 |
||
samba samba 4.0.7 |
||
samba samba 4.1.0 |
||
samba samba 4.0.1 |
||
samba samba 3.5.14 |
||
samba samba 4.0.8 |
||
samba samba 3.5.21 |
||
samba samba 3.6.13 |
||
samba samba 3.5.10 |
||
samba samba 4.1.10 |
||
samba samba 3.6.22 |
||
samba samba 3.5.5 |
||
samba samba 4.1.15 |
||
samba samba 3.5.0 |
||
samba samba 3.5.12 |
||
samba samba 4.0.0 |
||
samba samba 3.5.22 |
||
samba samba 3.6.15 |
||
samba samba 4.0.5 |
||
samba samba 4.1.2 |
||
samba samba 4.1.3 |
||
samba samba 4.0.18 |
||
samba samba 3.5.4 |
||
samba samba 3.5.18 |
||
samba samba 3.5.20 |
||
samba samba 4.1.1 |
||
samba samba 3.6.20 |
||
samba samba 4.0.23 |
||
samba samba 3.6.18 |
||
samba samba 3.6.21 |
||
samba samba 3.5.15 |
||
samba samba 4.1.13 |
||
samba samba 3.5.13 |
||
samba samba 4.0.12 |
||
samba samba 4.0.4 |
||
samba samba 4.0.15 |
||
samba samba 4.0.20 |
||
samba samba 3.6.14 |
||
samba samba 4.0.9 |
||
samba samba 3.5.16 |
||
samba samba 3.6.0 |
||
samba samba 3.5.3 |
||
novell suse linux enterprise server 12 |
||
novell suse linux enterprise desktop 12 |
||
novell suse linux enterprise software development kit 12 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 14.10 |
||
canonical ubuntu linux 14.04 |
Microsoft finds critical bug that hurts most recent Linuxes
Linux admins were sent scrambling to patch their boxes on Monday after a critical vulnerability was revealed in Samba, the open source Linux-and-Windows-compatibility software. The bug, which has been designated CVE-2015-0240, lies in the smbd file server daemon. Samba versions 3.5.0 through 4.2.0rc4 are affected, the Samba Project said in a security alert. An attacker who successfully exploits the flaw could potentially execute code remotely with root privileges, the project's developers warned...