DescriptionBuffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
Overall state of this security issue: Ignore
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- SUSE-SA:2007:016, published Thu, 15 Feb 2007 15:00:00 +0000