Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108295
Category:General
Title:Samba Server 'CVE-2017-15275' Heap Memory Information Leak
Summary:Samba is prone to a heap memory information leak.
Description:Summary:
Samba is prone to a heap memory information leak.

Vulnerability Insight:
The flaw exists due to the server which may return the
contents of heap allocated memory to the client.

Vulnerability Impact:
There is no known vulnerability associated with this error,
but uncleared heap memory may contain previously used data that may help an attacker compromise
the server via other methods. Uncleared heap memory may potentially contain password hashes or
other high-value data.

Affected Software/OS:
Samba versions 3.6.0 to 4.5.14, 4.6.x prior to
4.6.11, 4.7.x prior to 4.7.3.

Solution:
Update to Samba 4.5.15, 4.6.11, 4.7.3 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-15275
BugTraq ID: 101908
http://www.securityfocus.com/bid/101908
Debian Security Information: DSA-4043 (Google Search)
https://www.debian.org/security/2017/dsa-4043
https://security.gentoo.org/glsa/201805-07
https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html
RedHat Security Advisories: RHSA-2017:3260
https://access.redhat.com/errata/RHSA-2017:3260
RedHat Security Advisories: RHSA-2017:3261
https://access.redhat.com/errata/RHSA-2017:3261
RedHat Security Advisories: RHSA-2017:3278
https://access.redhat.com/errata/RHSA-2017:3278
http://www.securitytracker.com/id/1039855
http://www.ubuntu.com/usn/USN-3486-1
http://www.ubuntu.com/usn/USN-3486-2
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.