Ask the Community
Groups
CVE-2015-0240: Samba TALLOC_FREE vulnerability - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-0240</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p></p> <p>An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user).<br><br>Unitrends risk assessment: Severity High<br><br>The samba service is running by default on Unitrends servers and the security update needs to be applied.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p></p> <p>Fixed in:</p> <ul><li> <p>samba3x-3.6.23-9.el5_11 for CentOS5</p> </li> <li> <p>samba-3.6.23-14.el6_6 for CentOS6</p> </li> </ul><p>To update to the fixed version of samba, obtain the EAPP-601 security update from Unitrends support.</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-0240%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2015-0251.html%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2015-0249.html">https://access.redhat.com/security/cve/CVE-2015-0240 https://rhn.redhat.com/errata/RHSA-2015-0251.html https://rhn.redhat.com/errata/RHSA-2015-0249.html</a></li></ul> </article> </main>