CVE-2007-0453

Publication date 6 February 2007

Last updated 17 July 2025


Ubuntu priority

Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.

Read the notes from the security team

Status

Package Ubuntu Release Status
samba 7.04 feisty
Fixed 3.0.24-2ubuntu1.2
6.10 edgy
Not affected
6.06 LTS dapper
Not affected

Notes


kees

Solaris-only issue.