Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
https://issues.rpath.com/browse/RPL-1005
https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
http://www.vupen.com/english/advisories/2007/0483
http://www.ubuntu.com/usn/usn-419-1
http://www.trustix.org/errata/2007/0007
http://www.securityfocus.com/bid/22403
http://www.securityfocus.com/archive/1/459365/100/0/threaded
http://www.securityfocus.com/archive/1/459179/100/0/threaded
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
http://www.kb.cert.org/vuls/id/649732
http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
http://www.debian.org/security/2007/dsa-1257
http://us1.samba.org/samba/security/CVE-2007-0454.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
http://securitytracker.com/id?1017588
http://secunia.com/advisories/24151
http://secunia.com/advisories/24145
http://secunia.com/advisories/24101
http://secunia.com/advisories/24067
http://secunia.com/advisories/24060
http://secunia.com/advisories/24046