CVE-2015-0240

Publication date 23 February 2015

Last updated 24 July 2024


Ubuntu priority

The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.

Status

Package Ubuntu Release Status
samba 17.04 zesty
Fixed 2:4.1.13+dfsg-4ubuntu2
16.10 yakkety
Fixed 2:4.1.13+dfsg-4ubuntu2
16.04 LTS xenial
Fixed 2:4.1.13+dfsg-4ubuntu2
15.10 wily
Fixed 2:4.1.13+dfsg-4ubuntu2
15.04 vivid
Fixed 2:4.1.13+dfsg-4ubuntu2
14.10 utopic
Fixed 2:4.1.11+dfsg-1ubuntu2.2
14.04 LTS trusty
Fixed 2:4.1.6+dfsg-1ubuntu2.14.04.7
12.04 LTS precise
Fixed 2:3.6.3-2ubuntu2.12
10.04 LTS lucid
Not affected
samba4 17.04 zesty Not in release
16.10 yakkety Not in release
16.04 LTS xenial Not in release
15.10 wily Not in release
15.04 vivid Not in release
14.10 utopic Not in release
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
10.04 LTS lucid Ignored end of life

References

Related Ubuntu Security Notices (USN)

Other references