CVE-2007-0454
Severity CVSS v4.0:
Pending analysis
Type:
CWE-134
Format String Vulnerability
Publication date:
06/02/2007
Last modified:
09/04/2025
Description
Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/33101
- http://secunia.com/advisories/24021
- http://secunia.com/advisories/24046
- http://secunia.com/advisories/24060
- http://secunia.com/advisories/24067
- http://secunia.com/advisories/24101
- http://secunia.com/advisories/24145
- http://secunia.com/advisories/24151
- http://securitytracker.com/id?1017588=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
- http://us1.samba.org/samba/security/CVE-2007-0454.html
- http://www.debian.org/security/2007/dsa-1257
- http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
- http://www.kb.cert.org/vuls/id/649732
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A034
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
- http://www.securityfocus.com/archive/1/459179/100/0/threaded
- http://www.securityfocus.com/archive/1/459365/100/0/threaded
- http://www.securityfocus.com/bid/22403
- http://www.trustix.org/errata/2007/0007
- http://www.ubuntu.com/usn/usn-419-1
- http://www.vupen.com/english/advisories/2007/0483
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
- https://issues.rpath.com/browse/RPL-1005
- http://osvdb.org/33101
- http://secunia.com/advisories/24021
- http://secunia.com/advisories/24046
- http://secunia.com/advisories/24060
- http://secunia.com/advisories/24067
- http://secunia.com/advisories/24101
- http://secunia.com/advisories/24145
- http://secunia.com/advisories/24151
- http://securitytracker.com/id?1017588=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
- http://us1.samba.org/samba/security/CVE-2007-0454.html
- http://www.debian.org/security/2007/dsa-1257
- http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
- http://www.kb.cert.org/vuls/id/649732
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A034
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
- http://www.securityfocus.com/archive/1/459179/100/0/threaded
- http://www.securityfocus.com/archive/1/459365/100/0/threaded
- http://www.securityfocus.com/bid/22403
- http://www.trustix.org/errata/2007/0007
- http://www.ubuntu.com/usn/usn-419-1
- http://www.vupen.com/english/advisories/2007/0483
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
- https://issues.rpath.com/browse/RPL-1005



