CVE-2015-8467

7.5 HIGH
Published: December 29, 2015 Modified: May 06, 2026
View on NVD

Description

The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3433
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/79735
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034493
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2855-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-2855-2
Source: cve@mitre.org
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1290294
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201612-47
Source: cve@mitre.org
Third Party Advisory
https://www.samba.org/samba/security/CVE-2015-8467.html
Source: cve@mitre.org
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3433
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/79735
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034493
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2855-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-2855-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1290294
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201612-47
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.samba.org/samba/security/CVE-2015-8467.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

28 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
1.7%
83th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

canonical samba debian