Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 3.0.21a | 3.0.21a |
Samba | Samba | 3.0.23 | 3.0.23 |
Samba | Samba | 3.0.21b | 3.0.21b |
Samba | Samba | 3.0.21 | 3.0.21 |
Samba | Samba | 3.0.21c | 3.0.21c |
Samba | Samba | 3.0.23b | 3.0.23b |
Samba | Samba | 3.0.23d | 3.0.23d |
Samba | Samba | 3.0.23c | 3.0.23c |
Samba | Samba | 3.0.23a | 3.0.23a |
Samba | Samba | 3.0.22 | 3.0.22 |