Search for vulnerabilities
Vulnerability ID | VCID-219h-dfv6-aaac |
Aliases |
CVE-2015-0240
|
Summary | The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
Data source | Exploit-DB |
---|---|
Date added | April 14, 2015 |
Description | Samba < 3.6.2 (x86) - Denial of Service (PoC) |
Ransomware campaign use | Unknown |
Source publication date | April 13, 2015 |
Exploit type | dos |
Platform | linux_x86 |
Source update date | March 27, 2017 |
Data source | Metasploit |
---|---|
Description | This module checks if a Samba target is vulnerable to an uninitialized variable creds vulnerability. |
Note | {} |
Ransomware campaign use | Unknown |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/smb/smb_uninit_cred.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.99569 |
EPSS Score | 0.90874 |
Published At | March 29, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |