Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-0453

Опубликовано: 06 фев. 2007
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

РелизСтатусПримечание
dapper

not-affected

devel

released

3.0.25b-1ubuntu4
edgy

not-affected

feisty

released

3.0.24-2ubuntu1.2
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 68%
0.00596
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

debian
больше 18 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 throug ...

github
больше 3 лет назад

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

EPSS

Процентиль: 68%
0.00596
Низкий

4.6 Medium

CVSS2