VYPR
Unrated severityNVD Advisory· Published Feb 6, 2007· Updated Apr 23, 2026

CVE-2007-0454

CVE-2007-0454

Description

Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.

Affected products

52
  • cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
    • cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
  • Debian/Debian Linux25 versions
    cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*+ 24 more
    • cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
    • cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
    • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
    • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
    • cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

24

News mentions

0

No linked articles in our index yet.