Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2007-02-05 18:28
Updated : 2018-10-16 09:32
NVD link : CVE-2007-0453
Mitre link : CVE-2007-0453
JSON object : View
CWE
                Products Affected
                samba
- samba
 


