Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2015-0240

Disclosure Date: February 24, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • canonical,
  • novell,
  • redhat,
  • samba

Products

  • enterprise linux 5,
  • enterprise linux 6.0,
  • enterprise linux 7.0,
  • samba 3.5.0,
  • samba 3.5.1,
  • samba 3.5.10,
  • samba 3.5.11,
  • samba 3.5.12,
  • samba 3.5.13,
  • samba 3.5.14,
  • samba 3.5.15,
  • samba 3.5.16,
  • samba 3.5.17,
  • samba 3.5.18,
  • samba 3.5.19,
  • samba 3.5.2,
  • samba 3.5.20,
  • samba 3.5.21,
  • samba 3.5.22,
  • samba 3.5.3,
  • samba 3.5.4,
  • samba 3.5.5,
  • samba 3.5.6,
  • samba 3.5.7,
  • samba 3.5.8,
  • samba 3.5.9,
  • samba 3.6.0,
  • samba 3.6.1,
  • samba 3.6.10,
  • samba 3.6.11,
  • samba 3.6.12,
  • samba 3.6.13,
  • samba 3.6.14,
  • samba 3.6.15,
  • samba 3.6.16,
  • samba 3.6.17,
  • samba 3.6.18,
  • samba 3.6.19,
  • samba 3.6.2,
  • samba 3.6.20,
  • samba 3.6.21,
  • samba 3.6.22,
  • samba 3.6.23,
  • samba 3.6.24,
  • samba 4.0.0,
  • samba 4.0.1,
  • samba 4.0.10,
  • samba 4.0.11,
  • samba 4.0.12,
  • samba 4.0.13,
  • samba 4.0.14,
  • samba 4.0.15,
  • samba 4.0.16,
  • samba 4.0.17,
  • samba 4.0.18,
  • samba 4.0.19,
  • samba 4.0.2,
  • samba 4.0.20,
  • samba 4.0.21,
  • samba 4.0.22,
  • samba 4.0.23,
  • samba 4.0.24,
  • samba 4.0.3,
  • samba 4.0.4,
  • samba 4.0.5,
  • samba 4.0.6,
  • samba 4.0.7,
  • samba 4.0.8,
  • samba 4.0.9,
  • samba 4.1.0,
  • samba 4.1.1,
  • samba 4.1.10,
  • samba 4.1.11,
  • samba 4.1.12,
  • samba 4.1.13,
  • samba 4.1.14,
  • samba 4.1.15,
  • samba 4.1.16,
  • samba 4.1.2,
  • samba 4.1.3,
  • samba 4.1.4,
  • samba 4.1.5,
  • samba 4.1.6,
  • samba 4.1.7,
  • samba 4.1.8,
  • samba 4.1.9,
  • samba 4.2.0,
  • suse linux enterprise desktop 12,
  • suse linux enterprise server 12,
  • suse linux enterprise software development kit 12,
  • ubuntu linux 12.04,
  • ubuntu linux 14.04,
  • ubuntu linux 14.10

References

Advisory

Additional Info

Technical Analysis