{ "id": "CVE-2007-0453", "sourceIdentifier": "secalert@redhat.com", "published": "2007-02-06T02:28:00.000", "lastModified": "2018-10-16T16:32:49.450", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la librer\u00eda nss_winbind.so.1 de Samba 3.0.21 hasta 3.0.23d, como se usa en el demonio winbindd de Solaris, permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de las funciones (1) gethostbyame y (2) getipnodebyname." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Not vulnerable. These issues did not affect Linux versions of Samba.", "lastModified": "2007-05-14T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 4.6 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C" } ] } ] } ], "references": [ { "url": "http://securitytracker.com/id?1017589", "source": "secalert@redhat.com" }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916", "source": "secalert@redhat.com" }, { "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html", "source": "secalert@redhat.com" }, { "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/22410", "source": "secalert@redhat.com" }, { "url": "http://www.trustix.org/errata/2007/0007", "source": "secalert@redhat.com" }, { "url": "http://www.vupen.com/english/advisories/2007/0483", "source": "secalert@redhat.com" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231", "source": "secalert@redhat.com" }, { "url": "https://issues.rpath.com/browse/RPL-1005", "source": "secalert@redhat.com" } ] }