rhsa-2015_0257
Vulnerability from csaf_redhat
Published
2015-02-23 11:46
Modified
2024-11-22 08:54
Summary
Red Hat Security Advisory: samba security update

Notes

Topic
Updated samba packages that fix one security issue are now available for Red Hat Storage 2.1. Red Hat Product Security has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details
Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240) For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1346913 Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Richard van Eeden of Microsoft Vulnerability Research as the original reporter of this issue. All Samba users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the smb service will be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated samba packages that fix one security issue are now available for\nRed Hat Storage 2.1.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Samba is an open-source implementation of the Server Message Block (SMB) or\nCommon Internet File System (CIFS) protocol, which allows PC-compatible\nmachines to share files, printers, and other information.\n\nAn uninitialized pointer use flaw was found in the Samba daemon (smbd).\nA malicious Samba client could send specially crafted netlogon packets\nthat, when processed by smbd, could potentially lead to arbitrary code\nexecution with the privileges of the user running smbd (by default, the\nroot user). (CVE-2015-0240)\n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1346913\n\nRed Hat would like to thank the Samba project for reporting this issue.\nUpstream acknowledges Richard van Eeden of Microsoft Vulnerability Research\nas the original reporter of this issue.\n\nAll Samba users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, the smb service will be restarted automatically.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2015:0257",
        "url": "https://access.redhat.com/errata/RHSA-2015:0257"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/1346913",
        "url": "https://access.redhat.com/articles/1346913"
      },
      {
        "category": "external",
        "summary": "1191325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0257.json"
      }
    ],
    "title": "Red Hat Security Advisory: samba security update",
    "tracking": {
      "current_release_date": "2024-11-22T08:54:07+00:00",
      "generator": {
        "date": "2024-11-22T08:54:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2015:0257",
      "initial_release_date": "2015-02-23T11:46:22+00:00",
      "revision_history": [
        {
          "date": "2015-02-23T11:46:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2015-02-23T11:46:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T08:54:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Storage Server 2.1",
                "product": {
                  "name": "Red Hat Storage Server 2.1",
                  "product_id": "6Server-RHS-6.4.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:storage:2.1:server:el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Gluster Storage"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-winbind-devel@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-swat@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-common@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libsmbclient-devel@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libsmbclient@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-doc@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-domainjoin-gui@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-winbind@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-debuginfo@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-winbind-krb5-locator@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-client@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-glusterfs@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
                "product": {
                  "name": "samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_id": "samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba-winbind-clients@3.6.9-167.10.3.el6rhs?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "samba-0:3.6.9-167.10.3.el6rhs.src",
                "product": {
                  "name": "samba-0:3.6.9-167.10.3.el6rhs.src",
                  "product_id": "samba-0:3.6.9-167.10.3.el6rhs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/samba@3.6.9-167.10.3.el6rhs?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-0:3.6.9-167.10.3.el6rhs.src as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.src"
        },
        "product_reference": "samba-0:3.6.9-167.10.3.el6rhs.src",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-client-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-common-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1",
          "product_id": "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64"
        },
        "product_reference": "samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64",
        "relates_to_product_reference": "6Server-RHS-6.4.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Samba project"
          ]
        },
        {
          "names": [
            "Richard van Eeden"
          ],
          "organization": "Microsoft Vulnerability Research",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2015-0240",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2015-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1191325"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the version of samba package as shipped with Red Hat Enterprise Linux 4 and 5. It does affect the version of samba as shipped with Red Hat Enterprise Linux 6 and 7, as well as the version of samba3x shipped with Red Hat Enterprise Linux 5 and the version of samba4 as shipped with Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has determined that this vulnerability has Important impact on Red Hat Enterprise Linux 7 because the Samba version shipped in this version of the operating system only executes the vulnerable code after a memory allocation failure, making it more difficult to exploit this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.src",
          "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
          "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-0240"
        },
        {
          "category": "external",
          "summary": "RHBZ#1191325",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0240",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-0240"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0240",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0240"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/1346913",
          "url": "https://access.redhat.com/articles/1346913"
        },
        {
          "category": "external",
          "summary": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/",
          "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"
        },
        {
          "category": "external",
          "summary": "https://www.samba.org/samba/security/CVE-2015-0240",
          "url": "https://www.samba.org/samba/security/CVE-2015-0240"
        }
      ],
      "release_date": "2015-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2015-02-23T11:46:22+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.src",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2015:0257"
        },
        {
          "category": "workaround",
          "details": "On Samba versions 4.0.0 and above, add the line:\n\nrpc_server:netlogon=disabled\n\nto the [global] section of your smb.conf. For Samba versions 3.6.x and\nearlier, this workaround is not available.",
          "product_ids": [
            "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.src",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.src",
            "6Server-RHS-6.4.z:samba-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.10.3.el6rhs.x86_64",
            "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.10.3.el6rhs.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.