Unknown
CVE-2015-0240
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- enterprise linux 5,
- enterprise linux 6.0,
- enterprise linux 7.0,
- samba 3.5.0,
- samba 3.5.1,
- samba 3.5.10,
- samba 3.5.11,
- samba 3.5.12,
- samba 3.5.13,
- samba 3.5.14,
- samba 3.5.15,
- samba 3.5.16,
- samba 3.5.17,
- samba 3.5.18,
- samba 3.5.19,
- samba 3.5.2,
- samba 3.5.20,
- samba 3.5.21,
- samba 3.5.22,
- samba 3.5.3,
- samba 3.5.4,
- samba 3.5.5,
- samba 3.5.6,
- samba 3.5.7,
- samba 3.5.8,
- samba 3.5.9,
- samba 3.6.0,
- samba 3.6.1,
- samba 3.6.10,
- samba 3.6.11,
- samba 3.6.12,
- samba 3.6.13,
- samba 3.6.14,
- samba 3.6.15,
- samba 3.6.16,
- samba 3.6.17,
- samba 3.6.18,
- samba 3.6.19,
- samba 3.6.2,
- samba 3.6.20,
- samba 3.6.21,
- samba 3.6.22,
- samba 3.6.23,
- samba 3.6.24,
- samba 4.0.0,
- samba 4.0.1,
- samba 4.0.10,
- samba 4.0.11,
- samba 4.0.12,
- samba 4.0.13,
- samba 4.0.14,
- samba 4.0.15,
- samba 4.0.16,
- samba 4.0.17,
- samba 4.0.18,
- samba 4.0.19,
- samba 4.0.2,
- samba 4.0.20,
- samba 4.0.21,
- samba 4.0.22,
- samba 4.0.23,
- samba 4.0.24,
- samba 4.0.3,
- samba 4.0.4,
- samba 4.0.5,
- samba 4.0.6,
- samba 4.0.7,
- samba 4.0.8,
- samba 4.0.9,
- samba 4.1.0,
- samba 4.1.1,
- samba 4.1.10,
- samba 4.1.11,
- samba 4.1.12,
- samba 4.1.13,
- samba 4.1.14,
- samba 4.1.15,
- samba 4.1.16,
- samba 4.1.2,
- samba 4.1.3,
- samba 4.1.4,
- samba 4.1.5,
- samba 4.1.6,
- samba 4.1.7,
- samba 4.1.8,
- samba 4.1.9,
- samba 4.2.0,
- suse linux enterprise desktop 12,
- suse linux enterprise server 12,
- suse linux enterprise software development kit 12,
- ubuntu linux 12.04,
- ubuntu linux 14.04,
- ubuntu linux 14.10
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: