Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-02-05 18:28
Updated : 2018-10-16 09:32
NVD link : CVE-2007-0453
Mitre link : CVE-2007-0453
JSON object : View
CWE
Products Affected
samba
- samba