Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-7540

Published: 16 December 2015

The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.

Notes

AuthorNote
mdeslaur
says 4.0.0 to 4.1.21

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
precise Not vulnerable
(2:3.6.3-2ubuntu2.12)
trusty
Released (2:4.1.6+dfsg-1ubuntu2.14.04.11)
upstream
Released (4.1.22)
vivid
Released (2:4.1.13+dfsg-4ubuntu3.1)
wily
Released (2:4.1.17+dfsg-4ubuntu3.1)
xenial
Released (2:4.3.3+dfsg-1ubuntu1)
yakkety
Released (2:4.3.3+dfsg-1ubuntu1)
zesty
Released (2:4.3.3+dfsg-1ubuntu1)
Patches:
upstream: https://git.samba.org/?p=samba.git;a=commit;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d (4.1)
upstream: https://git.samba.org/?p=samba.git;a=commit;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884 (4.1)
samba4
Launchpad, Ubuntu, Debian
precise Does not exist
(precise was needed)
trusty Does not exist

upstream
Released (4.1.22)
vivid Does not exist

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist