CVE-2015-7540
Published: 16 December 2015
The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
Notes
Author | Note |
---|---|
mdeslaur | says 4.0.0 to 4.1.21 |
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(2:3.6.3-2ubuntu2.12)
|
trusty |
Released
(2:4.1.6+dfsg-1ubuntu2.14.04.11)
|
|
upstream |
Released
(4.1.22)
|
|
vivid |
Released
(2:4.1.13+dfsg-4ubuntu3.1)
|
|
wily |
Released
(2:4.1.17+dfsg-4ubuntu3.1)
|
|
xenial |
Released
(2:4.3.3+dfsg-1ubuntu1)
|
|
yakkety |
Released
(2:4.3.3+dfsg-1ubuntu1)
|
|
zesty |
Released
(2:4.3.3+dfsg-1ubuntu1)
|
|
Patches: upstream: https://git.samba.org/?p=samba.git;a=commit;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d (4.1) upstream: https://git.samba.org/?p=samba.git;a=commit;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884 (4.1) |
||
samba4 Launchpad, Ubuntu, Debian |
precise |
Does not exist
(precise was needed)
|
trusty |
Does not exist
|
|
upstream |
Released
(4.1.22)
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|