CVE-2015-0240 in Sambainfo

Zusammenfassung (Englisch)

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Reservieren

18.11.2014

Veröffentlichung

23.02.2015

Einträge

VulDB provides additional information and datapoints for this CVE:

Might our Artificial Intelligence support you?

Check our Alexa App!