Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmx9-cjc5-x3v9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

EPSS

Процентиль: 68%
0.00596
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

nvd
больше 18 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

debian
больше 18 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 throug ...

EPSS

Процентиль: 68%
0.00596
Низкий