SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE Systems Insight Manager Vendors:   HPE
(HP Issues Advisory for HP Systems Insight Manager) Samba smbd Memory Free Error Lets Remote Users Execute Arbitrary Code with Root Privileges
SecurityTracker Alert ID:  1032154
SecurityTracker URL:  http://securitytracker.com/id/1032154
CVE Reference:   CVE-2015-0240   (Links to External Site)
Date:  Apr 18 2015
Impact:   Execution of arbitrary code via network, Root access via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. HP Systems Insight Manager is affected.

A remote user can send specially crafted data followed by an anonymous netlogon packet to trigger an uninitialized memory error and execute arbitrary code on the target system. The code will run with root privileges.

Richard van Eeden of Microsoft Vulnerability Research reported this vulnerability.

Impact:   A remote user can execute arbitrary code with root privileges on the target system.
Solution:   HP has issued an advisory for HP Systems Insight Manager.

HP recommends updating the Samba package on the underlying operating system to fix this vulnerability.

The HP advisory is available at:

http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04636755

Vendor URL:  www.samba.org/samba/security/CVE-2015-0240 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (HP/UX), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 23 2015 Samba smbd Memory Free Error Lets Remote Users Execute Arbitrary Code with Root Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC