{"id":"MGASA-2015-0084","summary":"Updated samba packages fix CVE-2015-0240","details":"Updated samba packages fix security vulnerabilities:\n\nAn uninitialized pointer use flaw was found in the Samba daemon (smbd). A\nmalicious Samba client could send specially crafted netlogon packets that,\nwhen processed by smbd, could potentially lead to arbitrary code execution\nwith the privileges of the user running smbd (by default, the root user)\n(CVE-2015-0240).\n","modified":"2026-04-16T06:26:15.103448811Z","published":"2015-02-24T21:20:13Z","upstream":["CVE-2015-0240"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0084.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15347"},{"type":"WEB","url":"https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2015-0251.html"}],"affected":[{"package":{"name":"samba","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/samba?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.25-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0084.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}