Samba Remote Code Execution


Vulnerability Description

All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution vulnerability in the smbd file server daemon.

Exposure & Impact

A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges.
CVSS – 7.9

Remediation & Mitigation

VERT suggests that users install patches that are being released by the various distributions today.


The February 25th ASPL package will include coverage for CVE-2015-0240 on RHEL, CentOS, Ubuntu, Debian, and OEL.

Tripwire Enterprise customers can identify systems running vulnerable Samba versions by creating rules and policies using Command Output Capture Rules (COCR). This zip file contains policy and rule files needed to run a basic COCR. These rules can be imported and run on Linux groups to identify systems running Samba.



Threat Email Updates

Receive the latest Threat Alerts directly in your inbox:

Press Contacts

Cindy Valladares
Director of Corporate Communications