Vulnerability Description
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | 3.0.21 |
References
- http://osvdb.org/33098
- http://secunia.com/advisories/24043
- http://secunia.com/advisories/24101
- http://secunia.com/advisories/24151
- http://securitytracker.com/id?1017589
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware
- http://us1.samba.org/samba/security/CVE-2007-0453.html
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
- http://www.securityfocus.com/archive/1/459168/100/0/threaded
- http://www.securityfocus.com/archive/1/459365/100/0/threaded
- http://www.securityfocus.com/bid/22410
- http://www.trustix.org/errata/2007/0007
- http://www.vupen.com/english/advisories/2007/0483
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
- https://issues.rpath.com/browse/RPL-1005
FAQ
What is CVE-2007-0453?
CVE-2007-0453 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2)...
How severe is CVE-2007-0453?
CVE-2007-0453 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0453?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba.