CVE-2007-0454

Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
References
Link Resource
http://osvdb.org/33101
http://secunia.com/advisories/24021 Vendor Advisory
http://secunia.com/advisories/24046 Vendor Advisory
http://secunia.com/advisories/24060 Vendor Advisory
http://secunia.com/advisories/24067 Vendor Advisory
http://secunia.com/advisories/24101 Vendor Advisory
http://secunia.com/advisories/24145 Vendor Advisory
http://secunia.com/advisories/24151 Vendor Advisory
http://securitytracker.com/id?1017588
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
http://us1.samba.org/samba/security/CVE-2007-0454.html
http://www.debian.org/security/2007/dsa-1257
http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
http://www.kb.cert.org/vuls/id/649732 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
http://www.securityfocus.com/archive/1/459179/100/0/threaded
http://www.securityfocus.com/archive/1/459365/100/0/threaded
http://www.securityfocus.com/bid/22403 Patch
http://www.trustix.org/errata/2007/0007
http://www.ubuntu.com/usn/usn-419-1
http://www.vupen.com/english/advisories/2007/0483 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
https://issues.rpath.com/browse/RPL-1005
http://osvdb.org/33101
http://secunia.com/advisories/24021 Vendor Advisory
http://secunia.com/advisories/24046 Vendor Advisory
http://secunia.com/advisories/24060 Vendor Advisory
http://secunia.com/advisories/24067 Vendor Advisory
http://secunia.com/advisories/24101 Vendor Advisory
http://secunia.com/advisories/24145 Vendor Advisory
http://secunia.com/advisories/24151 Vendor Advisory
http://securitytracker.com/id?1017588
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
http://us1.samba.org/samba/security/CVE-2007-0454.html
http://www.debian.org/security/2007/dsa-1257
http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
http://www.kb.cert.org/vuls/id/649732 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
http://www.securityfocus.com/archive/1/459179/100/0/threaded
http://www.securityfocus.com/archive/1/459365/100/0/threaded
http://www.securityfocus.com/bid/22403 Patch
http://www.trustix.org/errata/2007/0007
http://www.ubuntu.com/usn/usn-419-1
http://www.vupen.com/english/advisories/2007/0483 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
https://issues.rpath.com/browse/RPL-1005
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*

History

21 Nov 2024, 00:25

Type Values Removed Values Added
References () http://osvdb.org/33101 - () http://osvdb.org/33101 -
References () http://secunia.com/advisories/24021 - Vendor Advisory () http://secunia.com/advisories/24021 - Vendor Advisory
References () http://secunia.com/advisories/24046 - Vendor Advisory () http://secunia.com/advisories/24046 - Vendor Advisory
References () http://secunia.com/advisories/24060 - Vendor Advisory () http://secunia.com/advisories/24060 - Vendor Advisory
References () http://secunia.com/advisories/24067 - Vendor Advisory () http://secunia.com/advisories/24067 - Vendor Advisory
References () http://secunia.com/advisories/24101 - Vendor Advisory () http://secunia.com/advisories/24101 - Vendor Advisory
References () http://secunia.com/advisories/24145 - Vendor Advisory () http://secunia.com/advisories/24145 - Vendor Advisory
References () http://secunia.com/advisories/24151 - Vendor Advisory () http://secunia.com/advisories/24151 - Vendor Advisory
References () http://securitytracker.com/id?1017588 - () http://securitytracker.com/id?1017588 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916 -
References () http://us1.samba.org/samba/security/CVE-2007-0454.html - () http://us1.samba.org/samba/security/CVE-2007-0454.html -
References () http://www.debian.org/security/2007/dsa-1257 - () http://www.debian.org/security/2007/dsa-1257 -
References () http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml - () http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml -
References () http://www.kb.cert.org/vuls/id/649732 - US Government Resource () http://www.kb.cert.org/vuls/id/649732 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:034 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:034 -
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html - () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html -
References () http://www.securityfocus.com/archive/1/459179/100/0/threaded - () http://www.securityfocus.com/archive/1/459179/100/0/threaded -
References () http://www.securityfocus.com/archive/1/459365/100/0/threaded - () http://www.securityfocus.com/archive/1/459365/100/0/threaded -
References () http://www.securityfocus.com/bid/22403 - Patch () http://www.securityfocus.com/bid/22403 - Patch
References () http://www.trustix.org/errata/2007/0007 - () http://www.trustix.org/errata/2007/0007 -
References () http://www.ubuntu.com/usn/usn-419-1 - () http://www.ubuntu.com/usn/usn-419-1 -
References () http://www.vupen.com/english/advisories/2007/0483 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0483 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32304 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32304 -
References () https://issues.rpath.com/browse/RPL-1005 - () https://issues.rpath.com/browse/RPL-1005 -

Information

Published : 2007-02-06 02:28

Updated : 2024-11-21 00:25


NVD link : CVE-2007-0454

Mitre link : CVE-2007-0454

CVE.ORG link : CVE-2007-0454


JSON object : View

Products Affected

mandrakesoft

  • mandrake_linux
  • mandrake_linuxsoft_2007
  • mandrake_linux_corporate_server

samba

  • samba

debian

  • debian_linux
CWE
CWE-134

Use of Externally-Controlled Format String