Описание
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | released | 3.0.25b-1ubuntu4 |
edgy | not-affected | |
feisty | released | 3.0.24-2ubuntu1.2 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 throug ...
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
EPSS
4.6 Medium
CVSS2