CVE-2015-0240
Vulnerability from cvelistv5
Published
2015-02-24 01:00
Modified
2024-08-06 04:03
Severity ?
Summary
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0084.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722696102151&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143039217203031&w=2
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0249.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0250.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0251.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0252.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0253.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0254.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0255.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0256.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0257.html
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3171
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:081
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
secalert@redhat.comhttp://www.securityfocus.com/bid/72711
secalert@redhat.comhttp://www.securitytracker.com/id/1031783
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2508-1
secalert@redhat.comhttps://access.redhat.com/articles/1346913
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1191325
secalert@redhat.comhttps://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/Exploit
secalert@redhat.comhttps://support.lenovo.com/product_security/samba_remote_vuln
secalert@redhat.comhttps://support.lenovo.com/us/en/product_security/samba_remote_vuln
secalert@redhat.comhttps://www.exploit-db.com/exploits/36741/
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2015-0240Vendor Advisory
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:03:10.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBUX03320",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
          },
          {
            "name": "RHSA-2015:0257",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html"
          },
          {
            "name": "RHSA-2015:0254",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2015-0084.html"
          },
          {
            "name": "SSA:2015-064-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345"
          },
          {
            "name": "36741",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/36741/"
          },
          {
            "name": "RHSA-2015:0250",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/product_security/samba_remote_vuln"
          },
          {
            "name": "SSRT101952",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
          },
          {
            "name": "USN-2508-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2508-1"
          },
          {
            "name": "openSUSE-SU-2016:1064",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
          },
          {
            "name": "SUSE-SU-2015:0386",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html"
          },
          {
            "name": "RHSA-2015:0253",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.samba.org/samba/security/CVE-2015-0240"
          },
          {
            "name": "72711",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72711"
          },
          {
            "name": "RHSA-2015:0249",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html"
          },
          {
            "name": "RHSA-2015:0251",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html"
          },
          {
            "name": "GLSA-201502-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
          },
          {
            "name": "DSA-3171",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3171"
          },
          {
            "name": "1031783",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031783"
          },
          {
            "name": "RHSA-2015:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
          },
          {
            "name": "MDVSA-2015:082",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
          },
          {
            "name": "HPSBGN03288",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
          },
          {
            "name": "openSUSE-SU-2016:1106",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln"
          },
          {
            "name": "MDVSA-2015:081",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081"
          },
          {
            "name": "RHSA-2015:0255",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/articles/1346913"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
          },
          {
            "name": "openSUSE-SU-2016:1107",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
          },
          {
            "name": "openSUSE-SU-2015:0375",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
          },
          {
            "name": "RHSA-2015:0256",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html"
          },
          {
            "name": "SSRT101979",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
          },
          {
            "name": "SUSE-SU-2015:0371",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html"
          },
          {
            "name": "SUSE-SU-2015:0353",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "HPSBUX03320",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
        },
        {
          "name": "RHSA-2015:0257",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html"
        },
        {
          "name": "RHSA-2015:0254",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2015-0084.html"
        },
        {
          "name": "SSA:2015-064-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345"
        },
        {
          "name": "36741",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/36741/"
        },
        {
          "name": "RHSA-2015:0250",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/product_security/samba_remote_vuln"
        },
        {
          "name": "SSRT101952",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2"
        },
        {
          "name": "USN-2508-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2508-1"
        },
        {
          "name": "openSUSE-SU-2016:1064",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
        },
        {
          "name": "SUSE-SU-2015:0386",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html"
        },
        {
          "name": "RHSA-2015:0253",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.samba.org/samba/security/CVE-2015-0240"
        },
        {
          "name": "72711",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72711"
        },
        {
          "name": "RHSA-2015:0249",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html"
        },
        {
          "name": "RHSA-2015:0251",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html"
        },
        {
          "name": "GLSA-201502-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
        },
        {
          "name": "DSA-3171",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3171"
        },
        {
          "name": "1031783",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031783"
        },
        {
          "name": "RHSA-2015:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
        },
        {
          "name": "MDVSA-2015:082",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
        },
        {
          "name": "HPSBGN03288",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
        },
        {
          "name": "openSUSE-SU-2016:1106",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln"
        },
        {
          "name": "MDVSA-2015:081",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081"
        },
        {
          "name": "RHSA-2015:0255",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://access.redhat.com/articles/1346913"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
        },
        {
          "name": "openSUSE-SU-2016:1107",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
        },
        {
          "name": "openSUSE-SU-2015:0375",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
        },
        {
          "name": "RHSA-2015:0256",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html"
        },
        {
          "name": "SSRT101979",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2"
        },
        {
          "name": "SUSE-SU-2015:0371",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html"
        },
        {
          "name": "SUSE-SU-2015:0353",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-0240",
    "datePublished": "2015-02-24T01:00:00",
    "dateReserved": "2014-11-18T00:00:00",
    "dateUpdated": "2024-08-06T04:03:10.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-0240\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-02-24T01:59:00.050\",\"lastModified\":\"2023-02-13T00:45:47.043\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.\"},{\"lang\":\"es\",\"value\":\"La implentaci\u00f3n del servidor Netlogon en smbd en Samba 3.5.x y 3.6.x anterior a 3.6.25, 4.0.x anterior a 4.0.25, 4.1.x anterior a 4.1.17, y 4.2.x anterior a 4.2.0rc5 realiza una operaci\u00f3n libre sobre un puntero de pila no inicializado, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes Netlogon manipulados que utilizan la API RPC ServerPasswordSet, tal y como fue demostrado mediante paquetes alcanzando la funci\u00f3n _netr_ServerPasswordSet en rpc_server/netlogon/srv_netlog_nt.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-17\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5900E6E-4379-4321-B69D-F9FBD341ACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C56B31-4495-4974-A47F-7D18734C9B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC8C2E40-DA05-4B50-AB29-398AF71EBECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5E81ED-032F-42B7-9D50-15CADE337AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDD90A4-B50B-4640-ADDE-B75BBC34507C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFC3804-991A-4BAF-818E-E321DB21FB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE1B4D9-507A-43B2-81F3-77E411ABEF7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857FCD47-F720-4273-BF1D-D5DC95ECA6D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8FE4AC-6E71-44CF-902D-BACA830C4CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EE762A-F95F-42CF-BB80-B0EF81A438EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738095D8-8ACE-4CF4-9D97-4228FC686F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D4634FC-DA4E-4B1D-B1AB-A45D8235780D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA83A66-BD39-4560-8EAF-ADF2433EF36D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B1F854-FC98-4DE9-8514-FD52301C5038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"388B4551-AF4C-46D6-840E-D489B05675C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52F9D2E0-C795-4A5A-9398-4630B78FCB26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D176AD-EA34-4DA2-9926-079438030E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A89C5FB-AA8B-41DC-93D5-81E199D73061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E71E10D0-E7C2-4D14-B685-4FB154B0A865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05993D31-BC6D-44CD-808C-4A40F998BF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5560111D-8930-4B70-BD51-25343FBEED1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66999F57-FF99-419F-BB12-35DC79FCE945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD1356E-3B43-4C5B-9969-902440918EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7F3209-B376-490B-A761-2CCB6CEE209A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3470D075-CCF2-42A1-A8C9-E375FC05FF47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA72F88-6799-4E6C-B73C-C92616B04661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7FA486-73CE-4226-86C6-DA8383C5578F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17D2B72-19E2-4DE6-B1E3-F1823E2690BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC6922A-03CD-484A-BF40-F8F937428062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8470C251-2874-4047-A759-F8D5C6D5C755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332308A1-4BA4-4BC7-8B4B-7463CF98B664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455B73D1-E8F1-478C-8CEB-79E4B5F33A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC49023-CAD6-4875-BF94-EEC290E8A5A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42BFAF8-5822-4782-B60D-BCB131834419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B8A690-81D0-40C4-9301-CF1992C2DA0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC65AE61-426D-4072-90A1-667AD31B73C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2855B3F6-49B6-4D25-BEAC-4D1797D1E100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1F1993-70A2-4104-85AF-3BECB330AB24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E955458C-8F5C-4D55-9F78-9E1CB4416F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"866FF7AC-19EA-49E7-B423-9FF57839B580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A1A64C7-B039-4724-B06C-EAC898EB3B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C572E25A-4B44-426D-B637-292A08766D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D96D806-ED52-4010-9F5F-F84E33C245D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643FC7D2-FC39-43FA-99E6-805553FE1DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B95519-0C9D-473C-912D-E350106DC4CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC603E1A-7882-45F0-9E8D-157F191C0FD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F9321C-B442-4081-8E4A-62BAD95239A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012A397B-004D-489C-B06D-C0D67E26B1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392E0C61-7718-4DBC-8F02-6F3C2CBE1783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324AE9D7-C41F-493E-A1AD-FCD869D29D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68519B1F-F315-4BBD-A4A3-4E1956D81E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF745E93-A92E-4AD7-8D42-36E9387C6915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E4B760-417E-45D1-9CE1-AEBC8936BDA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0DA221-078A-49DC-B0F1-F318FD785664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8F6AB9-A6C4-443E-A846-EE845BE24F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC522377-A6CD-4513-83B4-9ADC15F76B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55BC4595-5699-4237-BCD7-FD233BA1AECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB9C10B-284E-48CD-A524-1A6BF828AED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70DD815-1DAA-4025-8C97-32C7D06D8AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C33F47-0F28-4AE2-A895-82B5E0F4496D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EEFF35-E903-4651-A4B4-D92FF26A7509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44BD172-80FA-4260-BAFB-251A95E8C7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09116D2-F168-4305-9A1D-88A1D42739A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"558E0B71-F79E-47B5-90CC-9C165BB15507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8D7E102-DD54-43F2-B008-66F7C243477E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A03CB9E-DEFC-4507-A314-5E0824A66462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6708D6E-2098-432D-820A-853032BD9A8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B689AA-2074-4E9A-93BD-F910510A29AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF22E49-B259-4E13-B371-0C0173E534FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE10A1EF-F9CE-4126-9793-FB70A1D512A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA4DD6C-1531-420A-B271-EB16EA05470B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F221BF0-7B2B-4676-B8F2-2705C05B4034\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BB6157-21C1-43AF-9468-2E49D9BEFEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EC742C7-A22B-4707-985A-1F613A453C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1683841B-3598-4E31-8A4D-B1B552C60B91\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2015-0084.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0249.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0250.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0251.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0252.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0253.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0254.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0255.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0256.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0257.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201502-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3171\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:081\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:082\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/72711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1031783\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2508-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/articles/1346913\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1191325\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://support.lenovo.com/product_security/samba_remote_vuln\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.lenovo.com/us/en/product_security/samba_remote_vuln\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/36741/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.samba.org/samba/security/CVE-2015-0240\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.