Описание
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-0453
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
- https://issues.rpath.com/browse/RPL-1005
- http://osvdb.org/33098
- http://secunia.com/advisories/24043
- http://secunia.com/advisories/24101
- http://secunia.com/advisories/24151
- http://securitytracker.com/id?1017589
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
- http://us1.samba.org/samba/security/CVE-2007-0453.html
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
- http://www.securityfocus.com/archive/1/459168/100/0/threaded
- http://www.securityfocus.com/archive/1/459365/100/0/threaded
- http://www.securityfocus.com/bid/22410
- http://www.trustix.org/errata/2007/0007
- http://www.vupen.com/english/advisories/2007/0483
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 throug ...
EPSS