DEBIAN-CVE-2007-0475

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2007-0475
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2007-0475.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2007-0475
Upstream
Published
2007-02-03T23:28:00Z
Modified
2025-09-19T06:26:01Z
Summary
[none]
Details

Multiple stack-based buffer overflows in utilities/smb4k_*.cpp in Smb4K before 0.8.0 allow local users, when present on the Smb4K sudoers list, to gain privileges via unspecified vectors related to the args variable and unspecified other variables, in conjunction with the sudo configuration.

References

Affected packages

Debian:11 / smb4k

Package

Name
smb4k
Purl
pkg:deb/debian/smb4k?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / smb4k

Package

Name
smb4k
Purl
pkg:deb/debian/smb4k?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / smb4k

Package

Name
smb4k
Purl
pkg:deb/debian/smb4k?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / smb4k

Package

Name
smb4k
Purl
pkg:deb/debian/smb4k?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.1-1

Ecosystem specific

{
    "urgency": "low"
}