National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2015-0240 Detail

Description

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Source:  MITRE      Last Modified:  02/23/2015

Quick Info

CVE Dictionary Entry:
CVE-2015-0240
Original release date:
02/23/2015
Last revised:
12/07/2016
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
10.0 HIGH
Vector:
(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://advisories.mageia.org/MGASA-2015-0084.html External Source CONFIRM http://advisories.mageia.org/MGASA-2015-0084.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html External Source SUSE SUSE-SU-2015:0353
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html External Source SUSE SUSE-SU-2015:0371
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html External Source SUSE openSUSE-SU-2015:0375
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html External Source SUSE SUSE-SU-2015:0386
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html External Source SUSE openSUSE-SU-2016:1064
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html External Source SUSE openSUSE-SU-2016:1106
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html External Source SUSE openSUSE-SU-2016:1107
http://marc.info/?l=bugtraq&m=142722696102151&w=2 External Source HP SSRT101979
http://marc.info/?l=bugtraq&m=143039217203031&w=2 External Source HP SSRT101952
http://rhn.redhat.com/errata/RHSA-2015-0249.html External Source REDHAT RHSA-2015:0249
http://rhn.redhat.com/errata/RHSA-2015-0250.html External Source REDHAT RHSA-2015:0250
http://rhn.redhat.com/errata/RHSA-2015-0251.html External Source REDHAT RHSA-2015:0251
http://rhn.redhat.com/errata/RHSA-2015-0252.html External Source REDHAT RHSA-2015:0252
http://rhn.redhat.com/errata/RHSA-2015-0253.html External Source REDHAT RHSA-2015:0253
http://rhn.redhat.com/errata/RHSA-2015-0254.html External Source REDHAT RHSA-2015:0254
http://rhn.redhat.com/errata/RHSA-2015-0255.html External Source REDHAT RHSA-2015:0255
http://rhn.redhat.com/errata/RHSA-2015-0256.html External Source REDHAT RHSA-2015:0256
http://rhn.redhat.com/errata/RHSA-2015-0257.html External Source REDHAT RHSA-2015:0257
http://security.gentoo.org/glsa/glsa-201502-15.xml External Source GENTOO GLSA-201502-15
http://www.debian.org/security/2015/dsa-3171 External Source DEBIAN DSA-3171
http://www.mandriva.com/security/advisories?name=MDVSA-2015:081 External Source MANDRIVA MDVSA-2015:081
http://www.mandriva.com/security/advisories?name=MDVSA-2015:082 External Source MANDRIVA MDVSA-2015:082
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.securityfocus.com/bid/72711 External Source BID 72711
http://www.securitytracker.com/id/1031783 External Source SECTRACK 1031783
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345 External Source SLACKWARE SSA:2015-064-01
http://www.ubuntu.com/usn/USN-2508-1 External Source UBUNTU USN-2508-1
https://access.redhat.com/articles/1346913 External Source CONFIRM https://access.redhat.com/articles/1346913
https://bugzilla.redhat.com/show_bug.cgi?id=1191325 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1191325
https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ Exploit External Source CONFIRM https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
https://support.lenovo.com/product_security/samba_remote_vuln External Source CONFIRM https://support.lenovo.com/product_security/samba_remote_vuln
https://support.lenovo.com/us/en/product_security/samba_remote_vuln External Source CONFIRM https://support.lenovo.com/us/en/product_security/samba_remote_vuln
https://www.exploit-db.com/exploits/36741/ External Source EXPLOIT-DB 36741
https://www.samba.org/samba/security/CVE-2015-0240 Vendor Advisory External Source CONFIRM https://www.samba.org/samba/security/CVE-2015-0240

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Configuration 2
OR
cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
Configuration 3
OR
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
Configuration 4
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 14 change records found - show changes