Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmx9-cjc5-x3v9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

EPSS

Процентиль: 66%
0.00528
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

nvd
почти 19 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

debian
почти 19 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 throug ...

EPSS

Процентиль: 66%
0.00528
Низкий