CVE-2007-0454

CVSS V2 High 7.5 CVSS V3 None
Description
Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
Overview
  • CVE ID
  • CVE-2007-0454
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2007-02-06T02:28:00
  • Last Modified Date
  • 2018-10-16T16:32:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 18:17:33 Added to TrackCVE