CVE-2015-7540

The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3433 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/79736 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034492 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2855-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2855-2 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1288451 Issue Tracking Third Party Advisory
https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d
https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884
https://security.gentoo.org/glsa/201612-47 Third Party Advisory
https://www.samba.org/samba/security/CVE-2015-7540.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3433 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/79736 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034492 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2855-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2855-2 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1288451 Issue Tracking Third Party Advisory
https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d
https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884
https://security.gentoo.org/glsa/201612-47 Third Party Advisory
https://www.samba.org/samba/security/CVE-2015-7540.html Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-12-29 22:59

Updated : 2025-04-12 10:46


NVD link : CVE-2015-7540

Mitre link : CVE-2015-7540

CVE.ORG link : CVE-2015-7540


JSON object : View

Products Affected

samba

  • samba

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-399

Resource Management Errors