Rapid7 Vulnerability & Exploit Database

FreeBSD: samba -- Unexpected code execution in smbd (CVE-2015-0240)

Back to Search

FreeBSD: samba -- Unexpected code execution in smbd (CVE-2015-0240)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/23/2015
Created
07/25/2018
Added
02/24/2015
Modified
10/15/2015

Description

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Solution(s)

  • freebsd-upgrade-package-samba36
  • freebsd-upgrade-package-samba4
  • freebsd-upgrade-package-samba41

References

  • freebsd-upgrade-package-samba36
  • freebsd-upgrade-package-samba4
  • freebsd-upgrade-package-samba41

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;