First published: Sat Feb 03 2007(Updated: )
Multiple stack-based buffer overflows in utilities/smb4k_*.cpp in Smb4K before 0.8.0 allow local users, when present on the Smb4K sudoers list, to gain privileges via unspecified vectors related to the args variable and unspecified other variables, in conjunction with the sudo configuration.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Smb4K | =0.7 | |
Smb4K | =0.4 | |
Smb4K | =0.6 | |
Smb4K | =0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0475 has a high severity due to its potential for local privilege escalation.
To fix CVE-2007-0475, you should upgrade Smb4K to version 0.8.0 or later.
Local users with privileges listed in the Smb4K sudoers list are affected by CVE-2007-0475.
CVE-2007-0475 is caused by multiple stack-based buffer overflows in the Smb4K code.
Yes, versions before 0.8.0, specifically 0.4, 0.5, 0.6, and 0.7, are vulnerable to CVE-2007-0475.