Rapid7 Vulnerability & Exploit Database

ELSA-2015-0251 Critical: Oracle Linux samba security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

ELSA-2015-0251 Critical: Oracle Linux samba security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/23/2015
Created
07/25/2018
Added
02/24/2015
Modified
07/04/2017

Description

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Solution(s)

  • oracle-linux-upgrade-libsmbclient
  • oracle-linux-upgrade-libsmbclient-devel
  • oracle-linux-upgrade-samba
  • oracle-linux-upgrade-samba-client
  • oracle-linux-upgrade-samba-common
  • oracle-linux-upgrade-samba-doc
  • oracle-linux-upgrade-samba-domainjoin-gui
  • oracle-linux-upgrade-samba-glusterfs
  • oracle-linux-upgrade-samba-swat
  • oracle-linux-upgrade-samba-winbind
  • oracle-linux-upgrade-samba-winbind-clients
  • oracle-linux-upgrade-samba-winbind-devel
  • oracle-linux-upgrade-samba-winbind-krb5-locator

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;