Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 3.0.21 (including) | 3.0.21 (including) |
Samba | Samba | 3.0.21a (including) | 3.0.21a (including) |
Samba | Samba | 3.0.21b (including) | 3.0.21b (including) |
Samba | Samba | 3.0.21c (including) | 3.0.21c (including) |
Samba | Samba | 3.0.22 (including) | 3.0.22 (including) |
Samba | Samba | 3.0.23 (including) | 3.0.23 (including) |
Samba | Samba | 3.0.23a (including) | 3.0.23a (including) |
Samba | Samba | 3.0.23b (including) | 3.0.23b (including) |
Samba | Samba | 3.0.23c (including) | 3.0.23c (including) |
Samba | Samba | 3.0.23d (including) | 3.0.23d (including) |
Samba | Ubuntu | devel | * |
Samba | Ubuntu | feisty | * |