Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
https://issues.rpath.com/browse/RPL-1005
https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
http://www.vupen.com/english/advisories/2007/0483
http://www.trustix.org/errata/2007/0007
http://www.securityfocus.com/bid/22410
http://www.securityfocus.com/archive/1/459365/100/0/threaded
http://www.securityfocus.com/archive/1/459168/100/0/threaded
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
http://us1.samba.org/samba/security/CVE-2007-0453.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
http://securitytracker.com/id?1017589
http://secunia.com/advisories/24151
http://secunia.com/advisories/24101