7.9 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.3%
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
osvdb.org/33098
secunia.com/advisories/24043
secunia.com/advisories/24101
secunia.com/advisories/24151
securitytracker.com/id?1017589
slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
www.securityfocus.com/archive/1/459168/100/0/threaded
www.securityfocus.com/archive/1/459365/100/0/threaded
www.securityfocus.com/bid/22410
www.trustix.org/errata/2007/0007
www.vupen.com/english/advisories/2007/0483
exchange.xforce.ibmcloud.com/vulnerabilities/32231
issues.rpath.com/browse/RPL-1005
us1.samba.org/samba/security/CVE-2007-0453.html