Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 up to and including 3.0.23d, as used in the winbindd daemon on Solaris, allows malicious users to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
samba samba 3.0.23a |
||
samba samba 3.0.23b |
||
samba samba 3.0.23c |
||
samba samba 3.0.22 |
||
samba samba 3.0.23 |
||
samba samba 3.0.21 |
||
samba samba 3.0.21a |
||
samba samba 3.0.23d |
||
samba samba 3.0.21b |
||
samba samba 3.0.21c |