fkie_cve-2015-0240
Vulnerability from fkie_nvd
Published
2015-02-24 01:59
Modified
2025-05-09 20:15
Severity ?
Summary
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0084.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722696102151&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722696102151&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722696102151&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722696102151&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143039217203031&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143039217203031&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143039217203031&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143039217203031&w=2
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0249.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0250.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0251.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0252.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0253.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0254.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0255.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0256.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0257.html
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3171
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:081
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
secalert@redhat.comhttp://www.securityfocus.com/bid/72711
secalert@redhat.comhttp://www.securitytracker.com/id/1031783
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2508-1
secalert@redhat.comhttps://access.redhat.com/articles/1346913
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1191325
secalert@redhat.comhttps://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/Exploit
secalert@redhat.comhttps://support.lenovo.com/product_security/samba_remote_vuln
secalert@redhat.comhttps://support.lenovo.com/us/en/product_security/samba_remote_vuln
secalert@redhat.comhttps://www.exploit-db.com/exploits/36741/
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2015-0240Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0084.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142722696102151&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142722696102151&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142722696102151&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142722696102151&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143039217203031&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143039217203031&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143039217203031&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143039217203031&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0249.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0250.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0251.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0252.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0253.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0254.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0255.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0256.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0257.html
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3171
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:081
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/72711
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1031783
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2508-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/articles/1346913
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1191325
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20250509-0001/
af854a3a-2127-422b-91ae-364da2661108https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/Exploit
af854a3a-2127-422b-91ae-364da2661108https://support.lenovo.com/product_security/samba_remote_vuln
af854a3a-2127-422b-91ae-364da2661108https://support.lenovo.com/us/en/product_security/samba_remote_vuln
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/36741/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2015-0240Vendor Advisory
Impacted products
Vendor Product Version
redhat enterprise_linux 5
redhat enterprise_linux 6.0
redhat enterprise_linux 7.0
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20
samba samba 3.5.21
samba samba 3.5.22
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23
samba samba 3.6.24
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
novell suse_linux_enterprise_desktop 12
novell suse_linux_enterprise_server 12
novell suse_linux_enterprise_software_development_kit 12
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5560111D-8930-4B70-BD51-25343FBEED1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC65AE61-426D-4072-90A1-667AD31B73C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BB6157-21C1-43AF-9468-2E49D9BEFEAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC742C7-A22B-4707-985A-1F613A453C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1683841B-3598-4E31-8A4D-B1B552C60B91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c."
    },
    {
      "lang": "es",
      "value": "La implentaci\u00f3n del servidor Netlogon en smbd en Samba 3.5.x y 3.6.x anterior a 3.6.25, 4.0.x anterior a 4.0.25, 4.1.x anterior a 4.1.17, y 4.2.x anterior a 4.2.0rc5 realiza una operaci\u00f3n libre sobre un puntero de pila no inicializado, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes Netlogon manipulados que utilizan la API RPC ServerPasswordSet, tal y como fue demostrado mediante paquetes alcanzando la funci\u00f3n _netr_ServerPasswordSet en rpc_server/netlogon/srv_netlog_nt.c."
    }
  ],
  "id": "CVE-2015-0240",
  "lastModified": "2025-05-09T20:15:34.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-02-24T01:59:00.050",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2015-0084.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2015/dsa-3171"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/72711"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1031783"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2508-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/articles/1346913"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.lenovo.com/product_security/samba_remote_vuln"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.exploit-db.com/exploits/36741/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-0240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2015-0084.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/72711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2508-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/articles/1346913"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20250509-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/product_security/samba_remote_vuln"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/36741/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-0240"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-17"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…